Is your data truly safe when you move to the cloud? The recent fire at the OVHcloud’s data center in France proves that it is not. Here are four ways to keep your data safe, even when disaster strikes your cloud provider.
John Parlee, Chief Information Security Officer (CISO) at Park Place Technologies, talks to Security magazine about key trends in the network security space, including why analytics are critical to network security and how companies can ensure they have a viable monitoring solution.
Now that there’s momentum to build security controls into your Software-as-a-Service (SaaS) deployment, here are some actions that organizations can take in order to kickstart a SaaS security program.
As travel continues to make its comeback, businesses need to be taking a renewed look at their duty of care policies to provide their road warriors with the adequate — and expected — level of safety and security.
Take a crash course in the evolution of armored vehicles and physical security for assets on the move. While the first armored vehicles was built around 1870, advanced technologies have turned protection vehicles into sensing and surveillance machines.
Long-time cyberveteran with the USAF and currently Federal Practice Lead at A-LIGN, Tony Bai and Joe Cortese, Penetration Testing Practice at A-LIGN, navigate the complex future of supply chain security and discuss who should be responsible for supply chain protection.
Many schools are adopting technology solutions, specifically around student engagement, behavioral health, and safety mood monitoring technology to address students’ needs. These tools can help schools improve their ability to properly identify any students that may be struggling, as well as support all students through the process of acclimating to a new routine.
The security challenges involved with remote student access, coupled with a need for a user-friendly solution that allows students, faculty and staff to utilize resources when off campus, mean that school and university IT departments must consider a number of elements when evaluating the security of their remote access solutions.
Understanding and implementing these two best practices will save precious time and successfully lead an organization and communities through a major hurricane.
New consumer privacy laws and innovative fraudsters have given security professionals much to do in a supercharged digital economy. As our digital footprints widen, bad actors are finding increasingly sophisticated ways to access troves of personal information and sensitive data.