Background checks represent a moment in time, but continuous monitoring that listens to a candidate's data over time, looking and identifying changes in their background to mitigate risk is the future.
The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain on alert for malicious cyber activity targeting potential disaster victims and charitable donors following a hurricane.
The Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) was formed as a nonprofit by a group of U.S.-based maritime critical infrastructure stakeholders to promote cybersecurity information sharing throughout the community.
For the past 20 years, Justin Dolly, new CSO at Sauce Labs, has been leading security at public and private companies. Over the years, how has he built security teams and played a key role in risk management, security engineering and operations and compliance initiatives at the many companies he has serviced?
According to multiple sources, a bipartisan group of Senators plan to introduce a bill to regulate the use of contact-tracing and exposure notification apps. The bill, entitled the “Exposure Notification Privacy Act” is the latest in a series of bills that seek to regulate these new apps. The new bipartisan bill raises hopes that federal privacy legislation (albeit on a limited issue) may finally pass.
FEMA released the “COVID-19 Pandemic Operational Guidance for the 2020 Hurricane Season” to help emergency managers and public health officials best prepare for disasters, while continuing to respond to and recover from coronavirus (COVID-19).
U.S. Senators Ben Cardin (D-Md.), Jim Risch (R-Idaho) and Chris Murphy (D-Conn.) introduced the Global Health Security and Diplomacy Act (GHSDA) to better detect, deter, and contain infectious disease outbreaks overseas before they become global pandemics.
With the sudden shift to work-from-home operations, CISOs and security teams have an important role in strengthening business continuity by ensuring that current and future remote cybersecurity work policies do not create tradeoffs between usability and security. What are three steps to address this issue?