Every organization must prepare for a ransomware attack. The question is how best to do it. Surprisingly, we can turn to an unlikely source for advice on avoiding a ransomware attack – the criminals themselves.
In this piece, we look at what the Protect Duty law in the U.K. will look like, how it might impact legal requirements in other countries, and how security professionals in the U.S. and beyond can use the findings of the inquiry to fulfill their ethical responsibility to keep visitors and staff as safe as possible.
With the proliferation of ransomware attacks, every business feels the pressure—and often a sense of futility—in defending against cybercriminals. But companies can regain control by focusing on one of the most common attack vectors: Active Directory.
Security spoke to Bill Wright, Director of Federal Government Affairs at Splunk, for a deeper dive into strategies federal organizations can use to facilitate expedited zero trust adoption.
Today’s technological advancements have made it possible for merchants to strike an effective balance between minimizing fraud and maximizing customer satisfaction. The following three tips can help companies balance strong payment fraud prevention while providing an exceptional shopping experience.
As the vaccine rollout continues and organizations are planning their hybrid work plans, they must ensure this return to a physical office, even if it’s partial, doesn’t open them up to cybersecurity threats. Here, Rick McElroy, Principal Cybersecurity Strategist at VMware, discusses what chief information security officers should keep in mind as we get closer to returning to physical offices.
Zero trust has become the latest buzzword in the security industry. It’s helpful to analyze the model from the attacker’s perspective to identify assumptions or actions that could provide a foothold for cybercriminals.
Dr. Tommy Gardner, Chief Technology Officer of HP Federal, believes a proactive mindset that bridges the digital divide, recruits top talent and implements the right policies is needed for the U.S. to achieve success and remain competitive on a global scale. Here, he discusses how a national strategy for critical technologies can shape the industries of the future as well as address national security and global challenges.
As a more encompassing and modern approach that extends not only governance, risk and compliance capabilities but also Integrated Risk Management and Enterprise Risk Management, digital risk management provides new tools and techniques risk professionals can interweave into operations and technology with unprecedented detail to strengthening the enterprise.