The legalized marijuana industry is one of the fastest-growing industries in the U.S. Here are some solutions available to cannabis growers and dispensaries that may help comply with security and surveillance requirements.
To prevent damage from phishing attacks, organizations need to take a few simple but important steps to improve their email security posture. Follow these six strategies, and your email infrastructure will be far safer from phishing and business email compromise (BEC).
A new Kudelski Security report provides insights and recommendations to help organizations address recruiting, retaining and developing the next generation of security leaders.
Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he's calling Thunderspy - which targets devices with a Thunderbolt port.
As companies throughout the world turn to teleworking as a way of continuing operations in the face of COVID-19, employees and security teams alike have understandably faced growing pains in adjusting to this new reality. Here are five easy-to-follow tips that remote employees can follow to mitigate the risk of digital surveillance while working from home.
In a rapidly transforming threat landscape, cyber defense solutions must be both innovative and flexible to harden organizational security against ever-evolving adversarial attacks.
Active shooter technology has become a valuable tool that many security professionals are giving more consideration to, in light of the gun violence tragedies we see in our society on a regular basis. It’s important for security, facilities and IT directors to become familiar with active shooter technology to fully understand how it can be deployed, and how it benefits their company, employees and assets.
For business owners and property managers, public building security remains a universal challenge: How do you ensure the security of your staff and customers during hours of operation and protect your assets once regular business hours end? The conundrum that is security and safety in public spaces seems eternal, and the violence that fuels today’s headlines only exacerbates the urgency to find solutions to securing common building entrances.
When an incident or disaster occurs, security and fraud investigators go to work. They must be able to rely on innovative processes and tools that allow them to swiftly locate and analyze the information needed to determine the proper resolution or action. Credit unions need intuitive solutions that can be leveraged across multiple departments in a moment's notice to be more efficient and effective in today’s challenging environment.
The massive, overnight shift to a fully remote work environment during the COVID-19 crisis has amplified both the urgency and the obstacles around endpoint security. Not only were many machines not designed to work outside the corporate environment, leaving many companies woefully unprepared, but cybercriminals have already sprung to the occasion, preying on COVID-19 fears.