To help agencies understand and effectively manage encryption keys, SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC), in collaboration with the Federal Partnership for Interoperable Communications (FPIC), developed the Encryption Key Management Fact Sheet. Public safety organizations can leverage the Fact Sheet's information and familiarize themselves with the many aspects of encryption key management.
Recently, data tokenization has proved to be a successful protection method for securing sensitive information and all instances of personal data. This is because it allows information to retain its analytical value, while ensuring that it meets regulatory requirements.
Embedding cellular technology in a business continuity plan allows organizations to scale the network as needed, offers further security for those outside the corporate walls and ensures IT teams can more easily monitor and resolve any potential issues faster and easier. The workforce of tomorrow will see remote work security and cellular connectivity go hand-in-hand.
Microsoft's Azure Security Center (ASC), which regularly searches for and researches for new attack vectors against Kubernetes workloads, revealed a new campaign that was observed recently targeting Kubeflow, a machine learning toolkit for Kubernetes.
A new report, COVID-19, Conspiracy and Contagious Sedition: A Case Study on the Militia-Sphere, details how the Militia-sphere’s messaging has grown increasingly extreme as the pandemic has progressed, to the point of threatening and enacting violent attacks.
The Campbell University College of Arts and Sciences has announced the formation of a new academic department, the Department of Security and Computing, which will house cybersecurity, homeland security and ITS programs.
Bob Olsen, Senior Managing Director, has been appointed Global Head of Cybersecurity and Privacy at Ankura, global business advisory services firm. Based in Baltimore, Olsen will be responsible for supporting the continued expansion and growth of the firm’s cybersecurity and privacy practices in both existing and developing markets.
Honda's global operations have been hit with a ransomware attack. The company said earlier that the attack had affected operations at several facilities, as well as both customer service and financial services operations.
What are seven concrete steps you can put in place to address visitor management in this crisis situation and during your recovery phase for re-entry to the office?