A bipartisan bill proposed last month by New York representatives Kathleen Rice (D) and John Katko (R) would require members of Congress to receive annual cybersecurity and IT training.
Security teams today are under-staffed, over-worked, under-funded and struggling to stay abreast of the ever-changing threat landscape. Many security analysts work long hours poring over millions of security events to protect systems and fix vulnerabilities. Simply put, there is too much information and not enough analysts. Fortunately, humans are not the only answer for solving the cybersecurity crisis.
The International Foundation for Protection Officers, in conjunction with Security magazine, is now accepting nominations for the annual Bill Zalud Memorial Award for Professional Excellence.
Social media platforms such as Facebook, Twitter, Instagram, as well as specialized social networks and encrypted messaging apps have come under attack for facilitating violent extremism and serving as violent ideology laboratories
New Jersey Governor Phil Murphy and the New Jersey Office of Homeland Security and Preparedness (NJOHSP) launched the New Jersey Nonprofit Security Grant Pilot Program (NJ NSGPP) open application period which will remain open through June 14, 2019.
When is the last time your facility was subjected to an electrical power surge? Chances are, you have no idea – for two very good reasons. First, power surges are typically very brief – lasting only a few milliseconds. Secondly, most power surges are relatively small and go unnoticed, unless they are significant enough to make the lights flicker. Even so, they remain dangerous to your systems and should not be ignored – they are a silent killer of your critical electronic equipment.
Think back to 2009 and the phone you owned. While the phone you carry today might not look that different, a smartphone or its equivalent is far more powerful than it was just 10 years ago. While it is relatively easy for businesses to track the evolution of phone technology, have they similarly considered how their own corporate security departments have changed during the same period?
Imagine losing your car keys. It would be inconvenient, as you could be stranded for a while and you would need to find and obtain a replacement key. Now imagine losing a set of work keys. How much disruption could this cause your company? Remember the 2014 Sony breach? It was perpetrated by a group who claimed that they were able to access the movie studio's computer systems because Sony failed to lock their physical doors.
In the wake of many cybersecurity breaches, SEC's aggressive agenda demonstrates that cybersecurity management is vital to U.S. public companies and capital markets.