According to the U.S. Department of Justice’s Office of Victims of Crime, workplace homicides declined between 1995 and 2015. Yet workplace homicides are not the most common form of workplace violence — simple assault is. Simple assault is defined by the National Crime Victimization Survey (NCVS) as an attack without a weapon that results in no injuries or minor injuries (e.g., cuts, scratches, black eyes), or any injury requiring fewer than two days in the hospital.
Security professionals seeking to advance their careers often ask me whether certifications are worth it, and, if so, which ones they should pursue. The answer, of course, depends on the person and his or her goals. Plenty of people excel without a credential.
Job titles in the security profession are not always a good indicator of where you are in your career. We have conducted a wide variety of recruitment projects around the world for our clients. One consistency is that there is no consistency. At least insofar as security job titles are concerned.
Here are steps you can take to protect your enterprise against ransomware, limit the impact of a breach, understand where an attack can be stopped, and act fast if a hacker succeeds in gaining access.
Barak Tawily, Chief Technology Officer and Co-Founder of Enso Security, argues that most AppSec teams today spend most of their time creating relationships with developers and performing operational and product-related tasks — and not on application security. Here, we talk to Tawily about AppSec and why enterprise security should be concerned with AppSec.
While authentication and authorization might sound similar, they are two distinct security processes in the identity and access management (IAM) space. Authentication is the security practice of confirming that someone is who they claim to be, while authorization is the process of establishing the rights and privileges of a user. Here, we talk to Tehila Shneider about authorization, authentication, and why authorizations remains a problem that is mostly unsolved.
The threat landscape that organizations are facing is changing rapidly. Increasingly, senior leadership of multinational companies will have to think about the impact of an array of physical, cyber and digital risks to their organizations. To mitigate risk within the enterprise, there should be a renewed emphasis on how to restructure corporate security teams and how to reframe them within corporate structure. Here are some practical considerations.
As employees return back to the office, challenges continue to unfold and the best way to approach many of the computers and systems that have been off company premises for so long is to regard them as potentially infected.
The deployment of platforms for cybersecurity skill development results in budgetary reductions and cost savings, as well as improvements in critical security operations center (SOC) KPIs including mean time to remediate (MTTR) and dwell time, according to a report by Cyberbit and TAG Cyber. The report offers key insight to executive leadership on the impact of investing in realistic Security Operations Center (SOC) training solutions.
The 2021 Electronic Security Expo (ESX), presented by Electronic Security Association (ESA), has released the full educational lineup for its upcoming Virtual Experience, which will take place online from June 15-17.