This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Listen to a new podcast episode featuring Karen Worstell, Senior Cybersecurity Strategist at VMware. Drawing from her own experience as Chief Information Security Officer (CISO) at Microsoft and AT&T, Worstell discusses her career accomplishments as a security executive and how cyber leaders can manage burnout in their organizations.
Organizations are exposing their business to unnecessary risk by allowing employees to have residual access to systems and applications that they no longer need to have access to. Security teams need to evolve their current approach to better manage and control unauthorized user access.
Most people in the physical security industry are familiar with the 5 Ds: deter, detect, delay, deny and defend. These principles seem universally applicable for facility or asset protection use cases. But what principles should we apply in areas of open public access?