Secure and reliable utility operations are vital to national security across the globe. The frequency of attacks on critical infrastructure is rapidly rising, not just in the U.S., but across the globe. Here’s what security leaders can do to protect utilities.
Cybersecurity professionals are far more likely to hold vendor-specific certificates than certifications from a vendor-neutral association or standards-based organization, according to the (ISC)2 Cybersecurity Career Pursuers Study. But when asked which qualifications they would recommend to cybersecurity newcomers, professionals tend to prioritize vendor-neutral credentials.
With more than 4,000 ransomware attacks occurring daily since the start of 2016 according to The U.S. Department of Justice, every company of every size, every network stack and every infrastructure deployment is a potential target.
Fact is, security in the cloud needs improvement. The problem is that cloud service providers treat cloud security as a shared responsibility with their customers. And while cloud purveyors typically hold up their end of the bargain, many customers do not. Human error among cloud customers is rampant.
As travel continues to make its comeback, businesses need to be taking a renewed look at their duty of care policies to provide their road warriors with the adequate — and expected — level of safety and security.
The security and safety hazards for hospitality workers are so diverse, and physical security leaders within the organization need to protect frontline staff with a proactive, comprehensive approach to their well-being.
The ethical issues that exist around the wake of discovered security vulnerabilities are vast and murky. Far too often, the conversation about how and when to disclose security weaknesses shifts from a dialogue to a one-way monologue. What's a security leader to do?
5G, as often happens with new technologies, will likely introduce both digital and business revolution along with a plethora of new threat vectors. In particular with the exposure of new connected devices, industries and services, and sensitive assets will undoubtedly be affected by new cyber threat agents; the EU, however, is ready to mitigate these potential threats.
One of many consequences of the COVID-19 pandemic is an increase in cybersecurity risks and in the complexity of implementing effective security to protect organizational information and computing infrastructure. As with pre-COVID security threats, well-proven cybersecurity strategies based on user and device authentication remain effective, and they now are more important than ever.