Corporate enterprises and governments used to be the main targets of cyberattacks, but now any organization with an online presence is vulnerable. The surge in remote working due to the pandemic significantly increases risk as IT departments balance the demands of security, remote access and business continuity. Widespread use of new apps and solutions, credential sharing, unsecured Wi-Fi, weak passwords, lack of encryption and more provide cybercriminals with many opportunities to exploit gaps in security.
The National Center for Spectator Sports Safety and Security (NCS4) will host the 2020 National Sports Safety and Security Conference virtually October 12-14, 2020. Read on to learn about the speakers and panels.
To help you and your organization plan and implement an improved cyber hygiene program, we now present a framework for full IoT device defensibility in real world deployments at scale. This framework represents current state-of-the-art best practices for protecting IoT devices, and can form the backbone of your assessment, evaluation, and improvement plans. Follow the steps below to strengthen your network defenses.
Security veteran Matthieu Petrigh launched a new website with training programs on an array of topics dedicated to security professionals and those interested in learning security the he hopes will help others in the industry progress their careers.
Now more than ever, government policy makers need to focus resources; allowing law enforcement to focus on the core duties and responsibilities of law enforcement officers. And industries like ours, need to be creative in developing solutions to support them in this effort. The physical security industry supports law enforcement and when private security works in partnership with law enforcement, police officers have more time to focus on preventing and solving crimes.
The SEC’s Office of Compliance Inspections and Examinations (“OCIE”) recently issued a Risk Alert (the “Alert”) discussing cybersecurity observations from its examinations over time. The Alert did not state the time period of examinations included; however, OCIE has conducted several cybersecurity targeted exams over recent years.
We spoke to John Scimone, Dell’s Chief Security Officer, who runs a converged organization, combining physical and cybersecurity, about how he has personally navigated a culture of convergence and digital transformation at Dell.
ON DEMAND: In this webinar, security expert Pieter Danhieux explores how enterprise security, hand in hand with CISOs and CIOs, can inspire real change, fostering a positive security culture that enables enterprise development teams to become more security-aware, more aligned with internal AppSec specialists and, ultimately, ensuring a cyber-secure enterprise.
ON DEMAND: At the center of an organization's security operation stands its nucleus, one of the most important pieces for overall functionality: the global security operations center (GSOC). But that can look different based on goals, budget and overall vision. However, one commonality remains: the GSOC is where a variety of systems and solutions come together to provide a singular operational picture, mitigate threats and promote enhanced communication during an incident.
This month in Security magazine, we bring you our 2020 Most Influential People in Security annual report, where we highlight 22 industry leaders, their path to security, careers, goals and guidance for future security professionals. Industry experts discuss the evolution of ransomware, houses of worship security, cybersecurity standards, security careers in investigations and the unifying power of security. Diane Ritchey, past Editor-in-Chief, says goodbye and thank you to our readers.