Desjardins Group Chief Executive Guy Cormier said the credit union federation will offer free, permanent data protection to all its members in the wake of last month's data breach that affected 2.7 million individuals.
The Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the Washington Redskins held a joint tabletop exercise with local law enforcement and first responders to review and test plans to respond to a public safety emergency FedExField.
On October 1, 2017 a lone gunman fired down from the 32nd floor of the Mandalay Bay Hotel in Las Vegas, killings dozens of people attending a country music festival.
A list of nearly four dozen observable behavioral signs that someone might be planning to commit an act of extremist violence is contained in a newly updated publication released by the FBI, DHS and the National Counterterrorism Center.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced $35 million in funding opportunities for a new DHS Center of Excellence (COE) for Terrorism Prevention and Counterterrorism Research (TPCR).
It’s not an exaggeration to say a mobile phone is a lifeline to the world. Ever since it became affordable to carry a portable phone line and mini-computer wherever we go, mobile phones have gone from nice to necessary to can’t-live-without-them. From senior citizens down to the tiniest tyke, people love their phones – most people, anyway. So who doesn’t love mobile phones? Anyone who works in a correctional facility – because in a prison, a mobile phone isn’t a fun, useful gadget: It’s a safety issue.
Mobile device management (MDM) is a proven, cost-effective solution to meet an organization’s needs for security and control. However, as organizations scale up, or need to manage risk or stay compliant, they also need to manage costs. A company’s smartphones, tablets, laptops, and other connected devices—and the apps and data plans associated with those devices—are expenses, which can quickly escalate.
A new report from the Information Security Forum (ISF) explores the key elements that are integral to optimizing a SOC’s performance, realizing operational efficiency and pursuing innovation, and equips organizations with a practical understanding of how to design, establish and enhance a SOC that is both empowered by the organization, and aligned with business requirements.