Let's dive into what spear phishing is and how security teams can effectively tackle this very targeted method of digital attack, especially now that hackers are picking up their pace.
For the first installation of Security’s Leader to Leader column — for which I will interview security leaders across industries on their careers, their challenges and their views of risk and resilience every few months — I was fortunate to spend time with Shelley Benoliel, Head of Physical Security & Business Resilience at Zoom Communications, to talk about her career and her approach to the security industry.
5G is here and redefining network architecture. Taking responsibility for its advancement in a secure manner has never been more important. Who ultimately is responsible for its associated security?
As a security leader, do you better support the industry and serve your employer by attending in person events or do you play it safe and attend virtually, forgoing the in-person conversations, random encounters, and charged environment that bring so much value to these conferences? Risk professionals needs to weigh look at the data, look at the advice, and weigh the pros and cons of these situations, to maintain their status as a leader within the organization.
A resume or CV is an important component for any job search tool kit. However, there are other, newer ways to enhance or present your qualifications that you may not have previously considered. Taken together, you will have a multitude of options available to showcase your talents to potential employees.
David Zambri brings 28 years of law enforcement experience to his new role at the University of Central Florida, where he previously served as Deputy Chief of Police.
Yeager Airport will use the security grant funds to install multiple new safety technologies, including West Virginia's first gunshot detection system in an airport.
As the United States continues to face attacks across critical sectors —
energy and infrastructure, healthcare, and operational technology (OT) —
a cultural shift in cybersecurity is taking place.
Increased reliance on automation and new technologies to assist with meter reading, leak detection and other operational goals have opened a host of attack surfaces. Given the ever-evolving and multi-faceted threat landscape, sharing and collaboration are essential to water and wastewater security and resilience.