Whether your organization is migrating its physical security technology or any other operational technologies or processes onto the cloud, all security leaders need to migrate security controls and good security practices with those changes – or risk disaster.
The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) says the 2020 SolarWinds supply chain cybersecurity compromise could have been prevented with a decade-old security recommendation.
The Security Industry Association (SIA) announced the 2021 agenda and speaker lineup for AcceleRISE: The Challenge, an essential experience hosted by SIA’s RISE community for young professionals in the security industry.
Nick Heywood, Associate Vice President at Guidepost Solutions, talks to Security magazine about the physical, environmental, and cybersecurity issues behind long-empty offices that are reopening as restrictions lift.
Ultimately, behavioral biometrics offer a powerful tool for companies seeking to streamline user experience while increasing security measures using technology and tools that are already accessible through devices.
USB-based threats that can severely impact business operations increased significantly during a disruptive year when the usage of removable media and network connectivity also grew, according to a report by Honeywell.
CloudBees ahas hired Prakash Sethuraman as Chief Information Security Officer (CISO). Prior to joining CloudBees, Sethuraman worked at HSBC leading a cybersecurity team focused on container security.
WhiteHat Security published their latest installment of the AppSec Stats Flash report and podcast, surveying the current state of the application security and wider threat landscape.
Only 7% of security leaders report to the CEO. Security leaders have assumed more accountability and risk, but struggle to achieve the desired security posture, because they are not seen as influential or valued members of their peer group, according to new research.
Organizations should start perceiving penetration testing not as a formalistic or superfluous security task but as a legal duty and, most importantly, as a valuable contribution to their competitiveness on the global market where customers strongly value that you care about security of their data.