This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives. Read More
The fragility of supply chain security in many ways, rests on the shipping container. The incident in the Suez Canal has shed light on vulnerabilities and complexities within the supply chain.
One of many consequences of the COVID-19 pandemic is an increase in cybersecurity risks and in the complexity of implementing effective security to protect organizational information and computing infrastructure. As with pre-COVID security threats, well-proven cybersecurity strategies based on user and device authentication remain effective, and they now are more important than ever.
If security forces are going to perform more functions, which they should...they need additional training. More training for your security teams is an expensive proposition, but an all-important one.
Check out the week's top articles from SecurityMagazine.com, as well as the latest information about polls, eNewsletter opportunities and coming attractions.