As we have done in previous years, the Security magazine team compiled our favorite articles from this year. As we head into 2020, we hope you take a moment to review some of 2019’s top articles about lessons learned, thought leadership, security challenges and good practices.
Our baseline level of suspicion about the security of data and communications is very high these days. Are smart devices recording conversations and conveying them to marketers?
On October 10, 2019, the California Attorney General's office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. What are they, and what should enterprises do to achieve compliance and avoid costly fines?
On October 10, 2019, the California Attorney General’s (AG) office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. The AG’s office also announced that it will hold public hearings on the regulations on December 2-5.
To remedy the cybersecurity skills gap and fight data breaches, enterprises across the world are looking overseas. How can public-private partnerships help resolve the industry-wide issue?
How does Hector Rodriguez, Director of Public Safety and Security at Marymount California University, secure the campus, residential areas, staff members and students?
Corporations, universities and other institutions have faced the question of whether to outsource or not to outsource for decades when it comes to physical security and more recently on the cybersecurity side. What is the correct answer to this question?
What is a Defense-in-Depth strategy, and why has it come to be acknowledged as Expense-in-Depth? How can CISO's communicate the business value of this strategy?
As you advance your security career into senior and executive levels, occasions may arise where your personal values may conflict with those in the organization. How will you handle ethical challenges that may have career and life-long impacts?
Recent California wildfires have challenged enterprise security professionals who are responsible for protecting and managing emergency evacuations. How can enterprise security professionals leverage their existing security hardware and software investments to better prepare for emergencies?
While access cards still play a strong role in the access control market, some companies are moving toward smartphone Bluetooth-enabled technology to give residents frictionless access through secured doors, elevators and turnstiles.