As enterprises expand across the globe, so do the responsibilities of a security executive. Industry experts weigh in on wide-ranging issues from international investigations to supply chain resilience and more.
Security Integrators are a necessary link between security product manufacturers and enterprise security leaders. In this regular column, we ask leading security integrators what trends they’re seeing on the horizon, and how security enterprise leaders can be prepared.
In the security industry, transformation is inevitable. In this column, Brian Allen sparks a dialogue on leadership, management challenges and the evolution of the security profession. Join in the conversation here.
Intelligence is becoming as essential for modern security in the private and non-profit sectors as it has long been for governments. In this column, Daniil Davydoff helps you navigate and leverage the latest ideas and developments in intelligence analysis, global and workplace risk, threat assessments and investigations.
Steven Seiden, president of Acquired Data Solutions (ADS), has been involved in “digital divide issues” for more than 20 years, and he believes broadening inclusion and diversity in the STEM literacy field is one of his purposes. An engineer by trade, Seiden has experienced a shift in the tech world over the years, watching the convergence of technology, IT and IOT and noting the ever-expanding engineering lifecycle that now includes security.
Here’s an embarrassing admission: I’m a lifelong Jets fan. If you need proof that the organization is considered a laughingstock, a 2019 article in Inc. magazine is titled, “Want to Be a Great Leader? Look to the New York Jets—and Then Do the Opposite.”
Security search firms are frequently contacted by job seekers who reach out to request the recruitment company assist them in finding a new job. Inquiries come from professionals and executives in various stages of their public or private sector careers.
Today, open-source code is everywhere. In fact, 99% of all codebases contain open-source code, and anywhere from 85% to 97% of enterprise codebases come from open-source. What does that mean, exactly? It means that the vast majority of our applications consist of code we did not write.
We have previously talked about many aspects of how to advance your security career. This includes having a thorough understanding of both soft and operational skills sought after by organizations. The ability to execute on these attributes is valued when companies look for top talent for senior level security roles.
Last month this column looked at how humor can enhance leadership. Inspired by the book "Plato and a Platypus Walk Into a Bar: Understanding Philosophy Through Jokes," this month’s column explains security leadership through jokes.
As China forges its role as one of the great world powers, it relies upon a blast furnace of espionage operations to acquire foreign technologies and intellectual property, better position itself against competing international powers and control its own image both at home and abroad.
After being exposed to countless traumatic events, first responders often struggle with PTSD and mental health disorders. Beyond extending workers compensation benefits, what more can we do to help first responders?