Security awareness training is no longer a “nice-to-have” for organizations. End users have become a critical component of effective security postures. Employees must have a strong understanding of cybersecurity best practices and learn how to detect and defend against targeted attacks. This shift in priority is needed to address an ongoing trend in the larger threat landscape. Cybercriminals have moved away from complicated, time-consuming technical exploits to concentrate on end users, a large and frequently vulnerable attack surface. Small or large, nearly every attack now begins in the same way: by relentlessly targeting people through email, social networks, and/or cloud and mobile applications.
The rapid growth of extremist groups poses many challenges to enterprise security. How has social media and the Internet provided radical groups the means to spread their ideologies and what are the challenges with identifying and countering these groups?
According to a report from Cisco, 5G’s faster broadband (10 to 20 times faster than 4G) will enable 12 billion mobile-ready devices and IoT connections by 2022 compared to 9 billion in 2017. While this is great news for the rising number of smart device users globally, the increased connectivity can be taxing for IoT security. The combination of higher bandwidth and lower latency is a double-edged sword. While it enables new, exciting use cases like Vehicle-to-Vehicle and telemedicine, it is critical to not lose sight of the fact that it expands the scope of security threats, such as ransomware and botnets, among others.
Why does the practice of Data Economy typically requires a solid understanding of the characteristics of the underlying data resource? And how can that data be transformed into useful intelligence, where these processes are carried out with the upmost care to represent the interests of the Data Subject?
The legalized marijuana industry is one of the fastest-growing industries in the U.S. Here are some solutions available to cannabis growers and dispensaries that may help comply with security and surveillance requirements.
For business owners and property managers, public building security remains a universal challenge: How do you ensure the security of your staff and customers during hours of operation and protect your assets once regular business hours end? The conundrum that is security and safety in public spaces seems eternal, and the violence that fuels today’s headlines only exacerbates the urgency to find solutions to securing common building entrances.
The four individuals who were identified and indicted by the Trump Administration in relation to the Equifax breach from 2017 is yet another example of the overt collection efforts by the Chinese government to steal Americans’ sensitive personal information. The openness of the U.S. government to share these examples should help bring the reality of cyber threats to the forefront in corporate board rooms and research universities. I would like to highlight that these particular attacks were conducted for a different goal – espionage.
In the video surveillance world, data is growing rapidly due to the proliferation of surveillance cameras in both public and private spaces, the increased use of police body cameras and dash cams, and ever higher-resolution on all of these. In the U.S. alone, the surveillance marketplace is expected to grow to $68 billion by 2023.
While it might be tempting to reduce face recognition to an inevitable Orwellian nightmare, its benefits cannot be realized unless we educate ourselves about how the technology really works, separate fact from fiction, and pass common sense regulation that set guidelines for use. Here are five popular misconceptions about face recognition and privacy to help set the record straight on this powerful, emerging technology.