Security professionals can use these four strategies to better protect themselves against third-party risk, which can lead to cyberattacks and data breaches.
Healthcare employees are more likely to experience workplace violence (WPV) than any other profession. Five articles support the theory that simulators and coaching reduce workplace violence prevention through hands-on training that provides the workforce with the knowledge, awareness, skills and confidence to manage situations.
Threat actors are actively exploiting a critical security flaw in Java logging library Apache Log4j. Log4j is an open-source, Java-based logging utility widely used by enterprise applications and cloud services, meaning many organizations are at risk from threat actors actively exploiting this vulnerability.
National Cyber Resilience Centre Group (NCRCG) is comprised of government and corporate entities working together to ensure cybersecurity across the United Kingdom.
It feels like IT and security pros are tasked with the impossible job of operating business-critical applications in Infrastructure as a Service (IaaS) environments in the dark with no ability to monitor and protect them in runtime.
To manage unprecedented demand on the network, IT teams took to overprovisioning —
adding additional capacity to the network —
as a quick fix to maintain connections between employees, stakeholders and customers.
A new book focuses on risk management for enterprise security leaders. The publication, titled "Flip This Risk for Enterprise Security: Industry Experts Share Their Insights About Enterprise Security Management Risks for Organizations," discusses compliance, executive protection, travel security and more top-of-mind issues.