As retailers prepare for one of the busiest times of the year, let’s discuss some of the challenges and priorities to consider now to manage the evolving cybersecurity landscape ahead of the holidays.
As many have seen, the Log4Shell vulnerability, which was discovered over the weekend, is an extremely serious flaw and will likely impact organizations for years to come. Here’s what we know thus far, and how enterprises can remain safe as this vulnerability persists.
The Chief Information Security Officer (CISO) role has evolved greatly since its inception in 1995. Review the pros and cons of different CISO reporting models when it comes to business resilience and cybersecurity.
The first step in creating a complete data security plan is to know what types of data the company collects, where it is stored, and with whom and how it is shared. Next, the business should determine the potential risks to that data and whether the information resides in electronic or physical form (or both).
Pamela Perini, certified PSP and president of Pamela Perini Consulting, talks to Security about her journey through security and the process of risk assessment. She also touches on the importance of certification in the security industry and factors to consider when designing a security program.
Check out five tips on how to execute a successful ransomware tabletop exercise, including how to identify key participants and ensure representatives from core business and operations teams are involved.
If hackers can learn the ins and outs of your network, shouldn’t you beat them to the punch by obtaining deeper visibility and holistic mapping of your network infrastructure and attached applications, services, and devices?
Video surveillance has evolved with changing technology. Artificial intelligence-enabled surveillance presents various opportunities for public application.