Security magazine has a new video section with short, simple, critical considerations for security stakeholders on a number of subjects across all sectors.
Security leaders, employees and users all play a part in cybersecurity success. Implementing employee awareness programs and user education initiatives can help bridge an organization’s security gaps.
Cybersecurity and Infrastructure Security Agency (CISA) Executive Assistant Director for Cybersecurity Eric Goldstein outlined CISA's top cyber defense priorities, including defending against cyberattacks, zero trust and more.
Video surveillance and video management systems (VMS) are cornerstones of enterprise security, but with the advent of IP cameras, they can also open up organizations to cybersecurity risks. Containerization may mitigate these risks.
Listen to the latest The Security Podcasts episode as we talk with Stephanie Jaros about insider risk, building an appropriate program, and the criticality of when to address such threats.
A network-centric, autonomous response hardens cybersecurity defense in the distributed enterprise by reducing the attack surface and automatically eliminating potential threats before they can reach devices and information on a protected network.
Business leaders need security solutions that adapt to their environment and build off of the foundations they’ve set. New research from Johnson Controls highlights key areas of change that security executives can monitor.