When it comes to PKI, leaders have two options: build it or move it to the cloud. PKI as-a-Service (PKIaaS) platforms are becoming a popular investment choice that provide all the benefits of a privately rooted PKI, but without the cost and complexity of running it in-house. PKIaaS providers can deliver a much more effective, and ultimately more secure, PKI than most enterprises can achieve on their own. Regardless of whether the choice is to build or buy, teams must consider six key requirements to ensure in-house or out-sourced PKI success – and digital identity security.
As the world reopens, businesses have a host of logistical and legal issues to resolve in order to bring their employees back safely in the age of COVID-19. What are some practical tips for using thermal cameras to detect COVID-19?
The COVID-19 driven shift to remote working coupled with accelerated digital transformation poses significant challenges to enterprise cybersecurity operations, widening the threat landscape and exposing enterprise networks, devices and data to increasing cybersecurity risk. Unmanaged devices, shadow IT and rapidly deployed remote access networks have all introduced emerging vulnerabilities that are being exploited by cybercriminals, making securing the enterprise even more difficult for CSOs and their teams.
COVID-19 has initiated a whole new host of cybersecurity threats. Twitter was one of the latest victims, its employees allegedly being targeted so that hackers should take over the accounts of certain verified users. And just before that, a June 25 story in The New York Times detailed the way in which a foreign entity is attempting to infiltrate American business by taking advantage of remote employees whose organizations – more than 400 million worldwide – use virtual private networks (VPNs).
Six out of ten businesses target geographic diversification of supply chains to build resilience.
August 11, 2020
According to the Supply Chain Resilience Report 2020 from 3D Hubs, cybersecurity issues have affected less than 10% of firms over the past 10 years, compared to 60% that have suffered directly as a result of COVID-19 disruption.
Those traveling out of Los Angeles International Airport (LAX) now have access to personal protective equipment (PPE), such as hand sanitizer, face coverings and gloves via vending machines located in the ticketing areas of most terminals.
When reporting to the board of directors, the majority of CISOs measure the effectiveness of their program against a proven model. But what exactly should a CISO be measuring and reporting? Here are some top recommendations.
By looking at hospitals – and the resulting mad scramble and actions they took to protect their patients – there are four lessons that can be distilled to help those in the thick of a spike or for those planning for the next surge.
ON DEMAND: The purpose of contact tracing is well understood, but there are many misconceptions about how it works, who it should apply to, and how to implement it. This webinar will clarify these issues and will recommend specific capabilities that businesses and government organizations should consider when selecting contact tracing solutions.
ON DEMAND: Listen to healthcare security experts as they discuss their journey through the Covid-19 pandemic – from response to recovery, what they saw, and what they learned. This webinar will discuss how these experts reacted to the pandemic, the planning, the changes in their operations and staffing, and dealing with this new unforeseen risk.
Organized Retail Crime (ORC) is a serious problem that has been on the rise for several years. The unprecedented event of the current pandemic will rival or even exceed any previous events. If COVID-19 by itself wasn't bad enough, add civil disturbance, bail reform, and the state of law enforcement, and you have a perfect storm. Read More
Right now, in the pandemic environment, business leaders are balancing internal priorities – managing cost and impacts to productivity – with market and external priorities like government requirements, customer needs, and perceived standards of safety and health. Read More
In this webinar, we intend to share some real stories. What were your challenges? What solutions did you deploy to address these challenges? What were your results? As part of this webinar, we will also discuss business continuity and resilience and how we can continue to plan for residual risk in a changed world. Read More
This month in Security magazine, we examine how physical security leaders are being propelled into a unique position of revenue preservers and risk managers for their businesses. In addition, we profile Scott Ashworth, Director of Security for Atlanta United. Also, security leaders discuss how to develop cybersecurity careers, election security, data protection strategies, measuring and reporting security operations maturity and more!