Security professionals have a duty of care to employees and users to protect them from physical threats. The threat of active shooter situations necessitates a proactive security response.
As the volume of ransomware payments and rise in ransomware attacks continue to increase, CISOs must adapt to the evolving threat landscape and focus on practical strategies to strengthen resiliency.
By addressing parking lot security with cutting-edge video surveillance, businesses are finding that they’re not just protecting assets parked outside, they’re securing interests across their entire footprint.
Not only do cybersecurity leaders mitigate technology errors in their organizations' assets, but they also have to consider the risk of user error. Eliminating normalcy bias can help cyber leaders mitigate user risk.
As a leader, think carefully about the best and most effective strategies to ensure personal routines and actions convey the right message to your teams.
OT security and Industrial Control System Security (ICS), while improving, has not kept up with their evolving ecosystem, leaving systems exposed —
as seen by attacks on critical infrastructure.
Cybersecurity training, two-factor authentication, updating communication strategies and developing an attack strategy can help healthcare organizations bolster their cybersecurity strategy.
Most security breaches aren’t a consequence of inadequate security controls but are a direct result of human failure. So why do humans make mistakes? What triggers our behavior, and why are we so susceptible to manipulation? Understanding these triggers will greatly help organizations change their approach to information security.
Enterprises globally must harden existing firewall configurations; this is a non-negotiable activity. Over time firewall configurations experience a “drift” between what the business requires and what’s become obsolete.