A key factor in establishing trust is the presence of a Security Operations Center (SOC). The SOC is charged with monitoring and protecting many assets, such as intellectual property, personnel data, business systems and brand integrity.
IT security leaders are calling for an end to the complex password. They foresee biometrics, dual-factor authentication and eventually a new “whole person” approach to identity as being among the not-too-distant remedies for password malaise.
With the recent tragedies that have occurred on campuses as a result of domestic violence, now is a good time for schools to evaluate or re-evaluate their institution’s readiness and response capabilities to threats and incidents of domestic violence.
Security professionals are tasked with addressing reputational risk as well as physical risk, but are our own departments and industry doing enough to avoid being a risk to the enterprise as a whole? It’s time to take a good, hard look at your workplace and ask if it is inclusive, supportive and fair.
In today’s world, the Internet of Things (IoT) is ubiquitous and holds great potential, but also brings security concerns. While IoT devices are being used across industries, the healthcare industry’s experiences with insecure devices provide valuable lessons to heed.
I just came out of a meeting addressing campus lockdowns and mass notification when my phone started buzzing. The Broward County Sheriff Department’s Alertify message stared me in the face – Active Shooter at my daughter’s school.