A CISOs first 90 days on the job provide a window of opportunity for establishing their credibility and earning a vote of confidence from leadership. This requires, among other things, thoroughly assessing a corporation’s organization, technology, governance and the processes it embraces.
According to a report by Honeywell, improving cybersecurity for operational technology (OT) systems ranks as one of the top priorities for surveyed facility managers over the next 12 to 18 months.
CISA and FBI urge organizations to remain vigilant to ransomware threats on holidays, including this Labor Day
September 1, 2021
The Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency have observed an increase in highly impactful ransomware attacks occurring on holidays and weekends—when offices are customarily closed—in the United States, as recently as the Fourth of July holiday in 2021.
Many companies aren’t focused on cybersecurity disciplines directly, nor do they know how to optimize their cybersecurity. Therefore, it becomes the customers’ IT and technology partners’ job to focus on the basics, creating a faster and more fluid response for their clients. Let’s look at three ways partners can advise customers on their cybersecurity needs.
Specops researchers analyzed more than 800 million compromised passwords to determine the popularity of Division 1 Football Bowl Subdivision
programs and their team mascots and nicknames appearing on breached passwords lists.
Following the National Defense Authorization Act (NDAA) 2019 Section 889 and the ban of cameras and components made by certain Chinese companies, the Federal Communications Commission (FCC) has proposed a rule to ban products from Chinese electronics companies.
Instead of disrupting development with gates, organizations can implement a security champions program to build security guardrails into development. Here are five considerations for implementing an effective security champions program.
Any organization handling personally identifiable information through an IVR or contact center must secure its systems and implement proper risk management protocols. If they don’t, they and their customers may well suffer severe financial and reputational damage in the years to come.