When dealing with security threats, financial fraud and risk, and a myriad of other business challenges, organizations should align on a cybersecurity strategy that includes risk assessments.
The massive Kaseya security breach that impacted thousands forced the industry to re-evaluate their software supply chain security practices. Here we break down the cybersecurity lessons that still need to be learned.
Compliance is vital. But when it justifies the status quo, a compliance-only approach to cybersecurity can be counterproductive. However, the adoption of a risk management approach can be the most useful to enterprise cybersecurity teams.
The Texas Education Agency (TEA) and the Texas School Safety Center (TxSSC) released safety requirements for Texas schools after the school shooting in Uvalde that claimed 21 lives.
As Director of Security, Environmental Health & Safety and IT Risk Assurance, Theresa Bentch wants to create long-lasting and impactful security programs, helping her teams realize their potential.
Theresa Bentch, Director of Security, Environmental Health & Safety and IT Risk Assurance, is responsible for the safety and security of thousands of associates and visitors throughout 116 global sites at Garmin.
Privileged access management (PAM) is vital for enterprise security. With proper PAM tools, procedures and processes in place, organizations can lessen the risk of being the next data breach victim.