A bystander intervention training program called Shout-Up! has trained private security guards on best practices for stopping sexual harassment in entertainment venues and nightclubs.
Joseph "Rich" Baich brings years of military and private sector security experience to his new Chief Information Security Officer (CISO) role at the Central Intelligence Agency (CIA).
The Port of Vancouver USA has partnered with the Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) to launch the Lower Columbia River Maritime Information Exchange (LCR-MIX), hardening the port system against cyberattacks.
What are the tools and processes necessary to develop a comprehensive security program into a mature vulnerability assessment and risk management program?
There are several reasons an organization should look to become HITRUST certified: improved competitive advantage, cybersecurity, risk management and more.
Simplify and consolidate. Embracing this approach will do more than strengthen security postures — it will help decrease burnout, prevent data breaches and more.
Five years after the WannaCry ransomware attack, ransomware continues to be one of the most significant cybersecurity threats facing enterprises in 2022.
Software as a Service (SaaS) is everywhere, and its use in work environments presents cybersecurity risks to organizations. Identify the top risks of SaaS and how to manage them to maintain business resilience.