Each year, National Missing Children’s Day draws attention to the importance of developing greater protection for vulnerable children. Since more than 40 percent of all infant abductions occur in hospitals, it is crucial for security officers and directors to continue augmenting safety protocols and systems to protect newborns and their parents.
One thing is clear: the hybrid model will be permanent. Occupier requirements are constantly evolving and they are driving new considerations for landlords and workspace providers. Let’s review the core considerations and components required to create a secure tech operating layer that reassures the integrity of the workspace, operation and infrastructure while delivering a great occupier experience.
Failure of imagination leads to most crises. As the pandemic persists, vaccinations and vaccine resistance increases, mass shootings rise, and racial and political unrest show few signs of ebbing, seemingly impossible "what if" scenarios are our everyday reality. But can we prevent and protect ourselves from the bad impossibilities? In my experience, if we believe it can happen, then we can look for that trouble, see around corners and potentially head off bad situations. This is why opportunities for protective intelligence analysts are growing and, as digital transformation continues, will be one of the most in-demand roles at corporations alongside cybersecurity experts.
Distributed denial of service (DDOS) attacks - when an attacker attempts to make it impossible for a service to be deliverable - are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. To learn more about how these attacks have evolved over the years, we talk to Roy Horev, Co-Founder and CTO at Vulcan Cyber, a vulnerability remediation orchestration provider.
As employees return back to the office, challenges continue to unfold and the best way to approach many of the computers and systems that have been off company premises for so long is to regard them as potentially infected.
As employees return back to the office, challenges continue to unfold and the best way to approach many of the computers and systems that have been off company premises for so long is to regard them as potentially infected.
The traditional approach to securing cloud access goes against everything that DevOps is about. Regardless of what providers of legacy IAM, PAM, and other security solutions claim about their ability to scale with cloud application dev cycles, they’re concealing the extensive time, effort, and resources required to manage their solutions – three things that are in short supply in DevOps teams. So, the challenge becomes: how can enterprises integrate world class technologies for securing identities and access to cloud environments without bringing DevOps to a grinding halt?
COVID-19 brought with it a massive influx of data, most of it moving from a centralized location to the cloud (and other environments). Now, these businesses are trying to understand how to re-engineer their environment for the next 10+ years, in the advent of Zero Trust, SASE and more. How has COVID-19 impacted the need for cybersecurity consulting, specifically new trends, and Zero Trust? Here, we speak with Todd Waskelis, AVP of AT&T Cybersecurity, who leads AT&T’s cybersecurity consulting services.
Like the game of Texas Hold ‘Em, the practice of security is ultimately an exercise in decision-making. Specifically, how do you make the best decision possible with limited and incomplete information?