Think back to 2009 and the phone you owned. While the phone you carry today might not look that different, a smartphone or its equivalent is far more powerful than it was just 10 years ago. While it is relatively easy for businesses to track the evolution of phone technology, have they similarly considered how their own corporate security departments have changed during the same period?
New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.
The under-representation of women and people of color across the field of artificial intelligence is causing a “diversity crisis” that is contributing to the creation of flawed systems and technology, according to a New York University research center report.
Multiple cyber-attacks and compromise of personal information of millions of people globally show that the complexity and intensity of cybersecurity attacks are on the rise, and it could have broader political and economic ramifications. As cybercrimes become more lucrative and cybercriminals become smarter, cybersecurity too will have to be intelligence driven, enabling a swift response to the advanced attacks.
The WannaCry ransomware attack that successfully targeted Merck is not the only cyberattack to which the pharmaceutical industry has fallen victim. As pharmaceutical and biotechnology companies move toward greater digitalization and the storage of more valuable data, their digital security practices become more and more critical.
We just celebrated President’s Day. Folklore has it that during the American Revolution, George Washington was approached by an enquiring member of the press who asked: “George! George! What keeps you up at night?”
Health and safety incidents have become the leading financial loss drivers for businesses around the globe, with cumulative losses now outstripping the costs of more high-profile disruptions such as cyber-attacks or IT outages.
Our May issue cover article features “How SOCS Help in Training Security Professionals”.
Also in May, license plate reader technology is on the rise. How can LPR technology secure perimeters and lessen cybersecurity threats? And discover "How to meet the Growing Demand for Cybersecurity Professionals".