Compromises of mobile devices can be just as damaging. They have the potential to undermine an organization's customer data, intellectual property and more. How can enterprises take on persistent mobile security threats?
A new study from BELFOR Property Restoration found that despite the U.S. experiencing 14 major natural disasters in 2018 and incurring more than $91 billion in damages, 80 percent of respondents felt they are only moderately, slightly or not at all prepared for disasters.
Artificial intelligence (AI) and machine learning (ML) are being heralded as a way to solve a wide range of problems in different industries and applications, such as reducing street traffic, improving online shopping, making life easier with voice-activated digital assistants, and more.
Operational resilience refers to a business’s ability to prevent, respond to, recover and learn from operational disruptions. Without operational risk management, operational disruption to a business can impact financial stability, threaten the business’s overall viability, and/or harm consumers and other businesses. Yet challenges to ensuring resilience and continuity abound, and they grow more complex each year. But here is the good news: Solutions exist.
It is hard to believe that Global Security Exchange (GSX) 2019 is almost here. This year, it is anticipated that conversations will take a deeper dive into more intelligent security strategies and what their role is in the development of smarter infrastructures. Advanced security applications and data-enabled insights are a few main topics that will be top of mind for participants and attendees at GSX 2019.
Outsourcing by companies has been an area of growth for many years, and the trend does not seem to be slowing down. For example, Gartner is forecasting a 17 percent growth in public cloud use worldwide in 2019. Leading the way is infrastructure-as-a-service or (IaaS) with an expected 27 percent growth alone.
The relentless bombardment of cyber-attacks, and the fear of a breach and all that entails, have led to some rather dramatic changes in the Chief Information Security Officer position recently. It has long been considered the corporate hot seat, where job security is a misnomer and the average tenure is less than two years. That may still be true for many, but changes are happening that are finally allowing the CISO to emerge from the shadows of the IT department.
Our special report this month features 26 security leaders who are changing the industry, inspiring many and leading with innovation. Security experts discuss the CCPA, public-private relationships, mobile device security and how aware employees can mitigate active shooter events and workplace violence.