Governor Greg Abbott issued an Executive Order requiring all Texans to wear a face covering over the nose and mouth in public spaces in counties with 20 or more positive COVID-19 cases, with few exceptions.
The nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected – particularly when the malware does not disrupt the device’s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers.
Since joining the University of Utah as the inaugural Chief Safety Officer (CSO) in February 2020, Marlon Lynch has reorganized the structure of the Department of Public Safety. The changes, which include the addition of new leadership throughout the organization and the elevation and growth of existing divisions, increases capacity, improves accountability and better meets the needs of the U community.
Identity and access management (IAM) protects the business while keeping employees securely connected, but were organizations prepared for their employees to work from anywhere? LastPass ran a study with IT decision makers, in partnership with IDG, to discover the impacts of remote work to IAM and found that IAM is critical to securing a remote workforce, but almost all organizations have had to adjust their IAM strategy to securely enable employees to work from anywhere.
The Security Industry Association (SIA), through its Ethics in Security Technology Working Group, has developed the SIA Membership Code of Ethics, a set of nine ethics principles designed to promote the highest standards of conduct among its members.
Sure, Greek mythology begins with Zeus, Poseidon and Hades divvying up the universe in a game of dice. But they never employed risk management as a methodology to take the future into their own hands. How can security professionals best develop a risk mindset based on probability and rigor rather than intuition and emotion?