The 2020 Cybersecurity Perception Study finds most people still don’t view cybersecurity as a career field for themselves, even as nearly one-third (29%) of respondents say they are considering a career change.
The Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to target U.S. Government agencies.
The Human Trafficking Institute rolled out the 2019 State Summaries, which provide an overview of federal human trafficking cases in all 50 states, the five U.S. territories, and the District of Columbia. While the number of forced labor cases has remained steady for a few years, the number of criminal sex trafficking cases as a nation has trended down since 2017.
Brian Harrell, appointed by the President of the United States in December 2018 to serve as the Department of Homeland Security’s Assistant Secretary for Infrastructure Protection, resigned his post last week and is headed to the private sector.
The nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected – particularly when the malware does not disrupt the device’s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers.
ON DEMAND: New security technologies and services are often presented to security professionals within electrical utilities as a response to a perceived threat or risk, but end users can be unsure what solutions are appropriate or most effective for our specific needs. Enterprise physical security leaders are expected to make the right decisions in selecting and implementing security mitigations and controls that provide the best return on investment (ROI) and provide the appropriate level of security at their electrical utility sites.
This month in Security magazine, we bring you our 2020 Most Influential People in Security annual report, where we highlight 22 industry leaders, their path to security, careers, goals and guidance for future security professionals. Industry experts discuss the evolution of ransomware, houses of worship security, cybersecurity standards, security careers in investigations and the unifying power of security. Diane Ritchey, past Editor-in-Chief, says goodbye and thank you to our readers.