Organizations now believe that their cyber assets are more valuable than plant, property and equipment assets, even though they are spending four times more budget on insurance protecting cyber risks.
Ignoring cybersecurity whistleblowers or, even worse, subjecting them to retaliation will not fix data security problems. Instead, it will only result in increasing an organization's legal exposure and driving cybersecurity whistleblowers to report externally.
Between security systems manufacturers, integrators and end users, is anyone fully prepared to mitigate cybersecurity risk?
April 1, 2017
Whether it’s an HVAC system, a point-of-sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property.
This dual-sensor megapixel surveillance camera has the ability to film two directions at once, so it’s ideal for areas that require reliable surveillance at all times.
Recent developments in the cybersecurity sphere read like a dystopian novel. The devices we use for convenience and entertainment in our homes are being taken over for malicious purposes by forces unknown.
Access governance is currently one of the hottest topics when it comes to organizations securing their networks and data. Data breaches from outside hackers has always been big news – consider the coverage of the Target and Sony hacks, just to name a few of recent years.
There have been volumes written about the role of the CSO and how to gain a seat at the table in the C-suite. A relatively small number of CSOs have been able to convince their management that the CISO should be under their purview, citing the inherent mission conflicts that exist when the CISO reports to the CIO.
Ransomware is one of the most threatening malwares in the cyber industry, according to Carbonite’s Rise of Ransomware report, where 66 percent of IT professionals emphasize the seriousness of the issue, yet only 13 percent believe that they are prepared enough to prevent a ransomware attack.
A survey of U.S. oil and gas cybersecurity risk managers indicates that the deployment of cybersecurity measures in the industry isn’t keeping pace with the growth of digitalization in oil and gas operations.