The Cybersecurity and Infrastructure Security Agency (CISA) released the first in a series of six Cyber Essentials Toolkits - a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks.
The best UES solution is one that buttresses its capabilities by simplifying administration, increasing visibility and control, reducing costs and eliminating unnecesary friction all while providing a higher value of security, productivity and user experience.
There's a special place for people whose jobs don't require tremendous sacrifices but insert themselves into the fray. Many of them are security professionals.
COVID-19 may mean the end of the open office plan, in-person conferences and handshakes. How has cybersecurity changed, and what new role will CISOs play?
With the sudden shift to work-from-home operations, CISOs and security teams have an important role in strengthening business continuity by ensuring that current and future remote cybersecurity work policies do not create tradeoffs between usability and security. What are three steps to address this issue?
To bolster the resilience of the Global Positioning System (GPS) and the wide scope of technologies and services that rely on precision timing, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) is requesting information from the public about the broad use of positioning, navigation and timing (PNT) services, as well as the cybersecurity risk management approaches used to protect them.
H.R. 7011, the Pandemic Risk Insurance Act of 2020 (PRIA), would create the Pandemic Risk Reinsurance Program, a system of shared public and private compensation for business interruption losses resulting from future pandemics or public health emergencies.
Perhaps the most significant security advancement made at the enterprise level over the last two decades has not been technology, but rather its perception.
A new survey says that a vast majority of Americans say they value online safety, but many have habits that compromise the safety of their data and various online accounts—especially the tech-savvy younger generations who grew up during and after the internet revolution.
When we do a risk assessment, we evaluate the facility’s needs and identify any gaps in their physical security barriers and policies and procedures. Why should you integrate security early in the design process?