Starting on December 8, Apple will require all third-party developers to detail their app’s privacy information, according to an Apple post. Security experts note that this new update (iOS 14) puts additional focus on user privacy, and in particular gives users better visibility into their personal information that is shared with third parties.
U.S. Secretary of Transportation Elaine L. Chao announced the three-year Unmanned Aircraft Systems (UAS) Integration Pilot Program (IPP) successfully concluded on Oct. 25. Eight of the nine state, local and tribal governments that participated in the program have signed new agreements with the Federal Aviation Administration (FAA) to continue to tackle remaining UAS integration challenges.
Security alerts are imperative for effectively mitigating and preventing cyberattacks. But, a key challenge of modern threat protection solutions is the sheer number of alerts they generate – leading to “alert fatigue.”
To learn more about the dangers of alert fatigue, we talk to Mark Kedgley, CTO at New Net Technologies (NNT).
The Office of the Comptroller of the Currency (OCC) reported the key issues facing the federal banking system and the effects of the COVID-19 pandemic on the federal banking industry in its Semiannual Risk Perspective for Fall 2020.
ASIS International and the Security Industry Association (SIA), announced a free virtual event, titled “Global DE&I Strategy: Policy and Practices that Produce Positive Business Outcomes," to help security leaders around the world develop and implement diversity, equity and inclusion (DE&I) strategies.
While the technical root causes are the same, the impact of an IoT botnet attack on consumer versus enterprise and industrial devices is vastly different. An attack on a consumer gadget could be limited to a privacy issue, whereas the effect of a successful breach on a commercial device can have a significant production or safety cost. That’s why it’s more critical than ever for IT and OT security professionals to understand and be prepared to defend against this growing threat.
Veterans have a lot of offer potential security roles and bring many intangibles to the table. Here are some tips that may help guide the hiring conversation and help envision where a veteran can help your company.
In order to optimize Security + Operations and integrate it as a strategic function of the business, security teams need to shift their mindset to fully embrace automation. Doing this will require breaking down a few persistent barriers that stand in the way.
State and federal governments are enacting emergency rules, health standards, and legislation to respond to the COVID-19 pandemic. Canada rolled out new border measures in October. Vermont officials now require residents and non-residents coming from outside the select states, or counties within select states, to quarantine for 14 days. In Illinois, the governor declared all counties a disaster area.
It’s a common occurrence during a public health emergency — but it makes planning travel a complex task.
IP intercom solutions have emerged as a “must have” security solution for new and established facilities to protect people, assets, and property. A key component of an IP intercom solution, however, is its ability to provide intelligible communications to allow your security team to see beyond video and to protect employees and visitors from seen and unseen threats. What are 12 questions that you should ask before selecting an IP intercom solution?