Get to know Taylor Carr, Vice-President, Business Development & Integration for Securadyne Systems, and learn how Securadyne’s enterprise security executive customers are addressing cybersecurity in their enterprises.
May 1, 2014
Virtually all of the new video solutions we have deployed over the past few years have been IP-based. However, we still have many customers with existing large analog systems, and they need to operate, expand and optimize those systems today.
Would there be a greater return on investment if our information sharing focused less on enabling private sector victims to better duck and cover, and focused more on enabling the government to get the bad guys?
May 1, 2014
Regardless of how vigorously the industry applies risk management principles and how diligently the government shares information, there is no chance the private sector can consistently withstand intrusion attempts from foreign military units and intelligence services or even, for that matter, from transnational organized crime.
A new Ponemon Institute survey suggests key cybersecurity deficits, disconnects and low attack visibility in many enterprises.
April 30, 2014
The survey of nearly 5,000 global IT security professionals reveals a deficit in enterprise security systems, a disconnect in how confidential data is valued and limited visibility into cybercriminal activity. The report gives new insight into why cybercriminals have a foothold in the broader enterprise.
Verizon’s 2014 Data Breach Investigations Report, obtained early by FedScoop, identified nine overall threat patterns by collating 10 years of data, and Verizon researchers have now mapped those specific threat patterns to specific industries.
The holidays are a time to celebrate and rejoice with family and friends. However, during the most recent holiday shopping season, many found themselves worrying whether or not the gift they purchased for a loved one put them in jeopardy due to cyber-attacks.
News headlines are filled with enough stories about compromised data security, potentially driving executives away from networked and cloud solutions and back to the proverbial days of stuffing cash in a mattress.