What happens online sometimes manifests as a real-world threat. Real-world threats are typically planned, referenced or originated online. Understanding the convergence between online behavior and real-world actions is increasingly important in the corporate security field. Here’s how security professionals can think about identifying and understanding threats in a society that increasingly straddles the virtual and physical worlds.
The relentless bombardment of cyber-attacks, and the fear of a breach and all that entails, have led to some rather dramatic changes in the Chief Information Security Officer position recently. It has long been considered the corporate hot seat, where job security is a misnomer and the average tenure is less than two years. That may still be true for many, but changes are happening that are finally allowing the CISO to emerge from the shadows of the IT department.
How does Steve Baker, CSO at State Street Corporation, reduce risk, satisfy customers and regulators and provide a safe workplace for employees and visitors?
As CSO, Steve Baker is reponsible for the strategic plans and operations of the Global Security and Investigatives function. How does he guide direction and ensure alignment with the business functions of a successful enterprise?
On a recent trip to Australia, I appeared on a National morning news show. It wasn’t long until the hosts were trying to get me to weigh in on a debate that was then raging in their legislature.
End-to-end encryption provides a foundational data protection safeguard, allowing secure data transfer between the sender and recipient while blocking it from external compromise. It also means this data can be inaccessible to law enforcement, who then must find alternative means to access that data.
Nothing beats experience in the field for understanding the various ways a security entrance installation can go wrong. Here are some tales from the road – read on, and discover what not to do when deploying security entrances.
Security organizations may be late adopters of technology to manage their workforces, but once implemented, the early benefits of technological solutions become quite clear to them. They’re waking up to understand that simply placing a security officer at a post is no longer a viable option.