Security technology is one tool that enables enterprise security leaders to achieve their goals- learn more about new and upcoming security technology products and the latest industry innovations here.
Security services such as background checks, investigations and insurance often provide the backbone of a success enterprise security program. Learn more about services that can assist security leaders in building a stronger, secure enterprise.
U.S. President Joe Biden has signed an executive order (EO) to improve the cybersecurity of the U.S. As the U.S. faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately people’s security and privacy, the EO seeks to improve efforts to identify, deter, protect against, detect, and respond to these actions and actors. Specifically, the EO will:
The Port recently upgraded its mission-critical Transportation Management and Emergency Operations Center (TMC/EOC) to oversee the Port’s traffic flow, improve its maritime operations and provide a safer, more secure maritime area.
Reiknistofa Bankanna (RB), an IT service provider for Icelandic financial institutions, recently overhauled its security infrastructure with an array of physical security technology including cameras, access control, and video analytics through one unified interface.
Click Studios has advised customers to stay vigilant and ensure the validity of any email sent to them, as a bad actor has commenced a phishing attack with a "small number of customers having received emails requesting urgent action."
OpenText acquired Carbonite and Webroot in December 2019, helping expand the company’s cyber resilience portfolio and strengthening its comprehensive information management offering. As it happens, the acquisition could not have come at better time. By the end of March 2020, 98% of OpenText’s global workforce of more than 14,000 had pivoted to remote work due to COVID-19. OpenText, like so many others, had to adapt to the new normal and find a way to protect the data and devices that were now well beyond the company network and firewall.
Pima Community College, a comprehensive two-year institution serving students and employers throughout Pima County in Arizona and beyond, has deployed a robot for campus patrolling, saving security costs.
ON DEMAND: Chad Schermerhorn, Security Expert at Brivo, will discuss how your physical security stack should be an operational asset. It should be based on the strongest, and most-up-to-date smart security that can protect you today and adapt for unexpected threats that may come.
ON DEMAND: DevSecOps creates an environment of shared responsibility for security, where AppSec and development teams become more collaborative. With the right training and tools, developers can become more hands-on with security and, with that upskilling, stand out among their peers... however, they need the security specialists on-side, factoring them into securing code from the start and championing this mindset across the company.
ON DEMAND: The security ecosystem protects digital assets, physical assets, and people - the newly distributed workforce creates new and increased physical and cybersecurity risks. Situational and security awareness is a role every employee must play, and you’ll help get them there with awareness, cybersecurity hygiene and security practices that help keep company, employee and customer information safe.
ON DEMAND: The event will look at the in-car and off-board infrastructure cybersecurity policies, technologies, services, and products that will enable top OEMs and suppliers to strengthen their products’ defenses, mitigation, and resilience.
ON DEMAND: Join our subject matter experts as they explore how the right systems can help identify, analyze and report potential incidents and help building owners sustain compliance and create safer spaces.
ON DEMAND: IP geolocation data, which maps the IP address of a device connected with the Internet to a geographic location, has been helping inform online business decisions for almost 20 years. Although it is no longer the new kid on the digital block, it has become an ever-more essential tool, addressing more varied business needs and applications than ever before – all arising from the growth of anonymous incoming Internet traffic as well as increased numbers of remote workers. This is driving a need for accurate location insights at organizations around the globe.
ON DEMAND: This webinar will guide you through how VMS can optimize your security operations at the enterprise level and examine how Valerus, Vicon’s ONVIF-compliant, full-featured solution can improve security response times via AI-driven analytics as well as expedite forensic searches and investigations.
On Demand: This interactive crisis sim webinar is inspired by the real-life events of SUNBURST. In this scenario, you’ll focus on making decisions that balance the risks to your organization based on available facts.