Within the enterprise security and risk management community, there’s no debate about the financial impact of business downtime — a single hour of downtime can mean over $100,000 in losses for the overwhelming majority of businesses. But the consequences of downtime aren’t just monetary; they can be reputational as well.
The University of West Florida is launching a new degree program in direct response to increased workforce demand in STEM fields. Beginning in Fall 2019, UWF will offer a Master of Science in Cybersecurity.
Taking advantage of technology and digitization involves more than business strategy. It requires strong data governance principles which, among other things, must align the functional demands of an organization’s cybersecurity, privacy and information management teams.
This self-developed chipset delivers stellar video surveillance with key features that include 150 dB WDR performance, clear images in low-light locations, extensive bandwidth savings, a convenient USB port, various analytics, dual SD card slots and accurate stabilization.
Access governance is currently one of the hottest topics when it comes to organizations securing their networks and data. Data breaches from outside hackers has always been big news – consider the coverage of the Target and Sony hacks, just to name a few of recent years.
More than 5,000 vascular or thoracic patients seen between 2012 and 2015 at Sentara hospitals in Virginia. That’s what Norfolk, Virginia-based Sentara Healthcare discovered in November of 2016 within one of its third-party vendors.
Employees need to get their work done without oppressive security protocols, but they need to do so safely. If the team erects too many barriers, employees will find workarounds that jeopardize security.
ON DEMAND: Today more than ever before, organizations have significant interest in the intelligence that can be derived from video. Content can be leveraged for a multitude of purposes including operational efficiency, situational awareness, marketing and risk mitigation, making it highly valuable to multiple stakeholders. In fact, video is the most prominent Big Data application in the world, and once captured it has to be stored and protected to ensure its usefulness as a business intelligence tool.
Our May issue cover article features “How SOCS Help in Training Security Professionals”.
Also in May, license plate reader technology is on the rise. How can LPR technology secure perimeters and lessen cybersecurity threats? And discover "How to meet the Growing Demand for Cybersecurity Professionals".