On April 21, the Small Business Administration (SBA) revealed that around 8,000 small business loan applicants had their potentially sensitive information exposed in a data leak affecting the website being used to host the online application.
According to Verizon's 2019 Mobile Security Index report, two-thirds of organizations said they are less confident about the security of their mobile assets than other devices. Many of these breaches occur due to vulnerable devices, servers and applications that allow bad actors to gain access. Security breaches and the threat of compromise are a serious issue for organizations of all sizes.
After a seven-year tenure as Chief Security Scientist at Bank of America, Sounil Yu joined YL Ventures as Chief Information Security Officer-in-Residence. What is his main focus in his new role and what are his initial priorities over the next six months?
Risk remains the top concern for organizations adopting software-as-a-service (SaaS) models and this is an issue that is only getting worse. What is needed today is the ability to remove the dependency on human behavior and human error, bringing control back to the security team.
When it involves the safety of residents, data needs to be reliable and easily accessed – which is where a 0G network comes in. IoT connectivity options like 0G provide a cost-efficient, low-power and user-friendly experience, with simple integration for public safety officials looking to stay up-to-date and secure. Here are some ways IoT devices running on a 0G network can be used to aid officials, allowing for better public safety.
Even if a Chief Information Security Officer (CISO) performs 99 percent of their tasks perfectly, there is still plenty of opportunity to make mistakes. When companies have unpatched vulnerabilities, or incorrect configurations, or other holes in their security tactics (not to mention the "set it and forget it” mentality after deployment)—security management can quickly become a CISO’s nightmare. This is why it's so important for leaders to consider the following when developing the right security approach for their organizations.
Improving the safety and well-being of our law enforcement professionals remains a key priority for communities across the U.S. Among the biggest obstacles to achieving this goal, however, are the outdated police documentation workflows and processes, which are often still manual (and some departments still rely on pen-to-paper).
As coronavirus cases continue to emerge in cities across the country, it’s the responsibility of local officials to continuously address the evolving situation with the public. When communicating with the public about pressing emergencies, such as the coronavirus, here’s what public safety officials need to accomplish with their messaging.
CEOs cite cybersecurity as the biggest threat to the world economy and as a result, the global spend in cybersecurity is expected to surpass $1 trillion by 2021. An enterprise cyber attack can turn into a catastrophe in a matter of hours, potentially damaging any business at any point in time. As we see from the past few years, the greatest have already fallen.
You are a new Chief Information Security Officer (CISO) in the financial services industry. You are excited about the job but anxious due to the scale of the cyber threat from a range of actors: lone-wolf hackers, organized crime syndicates, governments and their proxies, and insiders. As you think through your game plan for addressing these threats, what’s your most important first step?