This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Mary Gates, President at safety consultancy GMR 410 and former global security executive at JP Morgan Chase, shares security leadership advice in this AMA video podcast.
Outsourcing has become a vital part of most business strategies. Not only is it a way to save money, but it’s a simple way to take advantage of expertise you might not currently have in house. But outsourcing can also leave companies vulnerable if the third-party doesn’t have proper cybersecurity procedures.
Mimecast Limited released the latest report from the Cyber Resilience Think Tank highlighting four trends for building and operating a Security Operating Center (SOC).
There are more than 4,300 security video cameras in the Big Apple’s busy subway system. But after an investigation last year of a violent stabbing attack lacking any images for follow up, the Metropolitan Transportation Authority (MTA) took inventory and discovered that about half of them did not work, or recording was faulty, or the lens or dome was dirty or spray painted, or the field of view had changed and the cameras not.