Email monitoring, video surveillance and keylogger software are some of the methods employers use to track productivity in the remote work environment. However, a new study from VMware, "The Virtual Floorplan: New Rules for a New Era of Work," has found a higher employee turnover rate in businesses that monitor productivity remotely.
A new survey from Pulse and Hitachi ID reveals that nearly half of all enterprise team members have been approached by cybercriminals to assist a ransomware attack.
By using fingerprints or portraits to register citizens, biometric registries have the most significant utility in countries with unreliable or non-existent national ID systems. Let’s explore how biometric authentication works and can bring empowerment to populations worldwide.
Work and life can coexist. Security leaders, at all levels, are responsible for setting precedents, norms and boundaries so their teams have quality time that can help to decrease the risk of burnout and promote strong norms for well-being.
An exit strategy is not necessarily top of mind if you are enjoying a successful security career. How do you start planning your exit strategy when you are no longer seeking professional advancement?
One of the insights that this year’s security leaders shared with us was which metrics their security programs and the C-suite find most valuable — and we found some overarching trends in this area.
Foregrounding transparency can go a long way in securing your organization's technology and workforce, according to four cybersecurity experts from Intel. Suzy Greenberg, Vice President of Communications and Incident Response; Maggie Jauregui, Offensive Security Researcher; Katie Noble, Director of Intel's Product Security Incident Response Team (PSIRT) and Bug Bounty; and Amit Elazari, Director of Global Cybersecurity Policy discussed transparency in bug bounty and vulnerability disclosure programs, as well as gender parity in cybersecurity.
Cornell researchers and FreedomPay have partnered to release the "Check Please! How Restaurant, Retail and Hospitality Businesses are Managing Cybersecurity Risks" study, which measures enterprise leaders' perspectives on cybersecurity in the retail and hospitality sector.
The Indianapolis Symphony Orchestra (ISO) secures its historic concert hall with an access control and weapons detection system from STANLEY Security and Evolv, aiming to reduce security wait times and contact points for patrons.
Reducing our threat surface by limiting what any one person can access and improving organizational efficiency processes can go a long way in mitigating damage from the vast majority of attacks — no matter if they come from inside or outside your organization.