Executive search and consulting firm Raines International launched its Security Officers Practice, co-developed with The Lake Forest Group, a security services firm specializing in all aspects of security, safety, and compliance.
(ISC)², a nonprofit association of certified cybersecurity professionals, unveiled the agenda for its 10th annual Security Congress, which will take place virtually November 16-18, 2020.
The Human Trafficking Institute rolled out the 2019 State Summaries, which provide an overview of federal human trafficking cases in all 50 states, the five U.S. territories, and the District of Columbia. While the number of forced labor cases has remained steady for a few years, the number of criminal sex trafficking cases as a nation has trended down since 2017.
Recently, two teens and a young adult infiltrated one of Silicon Valley’s biggest companies in a high-profile hack – and the biggest ever for Twitter. Authorities say the 17-year-old “mastermind” used social engineering tactics to convince a Twitter employee that he also worked in the IT department and gained access to Twitter’s Customer Service Portal. The 130-account takeover proved unique, as it was fundamentally a dramatic manipulation of trust and could have had far more world-changing consequences if the attackers had the aspirations of say, a dangerous fringe group versus that of a teenager. There are a few takeaways to learn here, especially when it comes to considering redefining what we classify as “critical infrastructure” and what must be protected at all costs.
Last week, Didier Reynders, European Commissioner for Justice, and Dr. Andrea Jelinek, Chair of the European Data Protection Board (EDPB), appeared at a hearing conducted by the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs, and updated committee members on their work since the Schrems II decision.
In his remarks, Mr. Reynders identified three main areas on which the Commission is focusing.
There are currently a multitude of different standards and regulations to address the urgent need to secure our connected world, yet it's time to create a unified global conformance assessment.
The 2020 Penetration Risk Report also says cloud environments are most vulnerable to two types of attacks and medium-sized enterprises are the slowest to improve network security.
As some U.S. states relax their shelter-in rules, businesses prepare for a slow recovery due to the uncertainty of COVID-19’s almost certain resurgence. The questions arise for those physical businesses in need of unarmed or armed guards: what precautions are to be taken by guards, and what kind of interaction is there going to be with their customers?
We talk to David “moose” Wolpoff, Chief Technology Officer (CTO) and co-founder of Randori, about Black Hats’ processes for finding and exploiting weaknesses in software.
As businesses and schools seek to bring people back to brick and mortar establishments, it’s going to be important to make customers, students and teachers feel comfortable, in addition to simply following guidelines. Customers are going to have to feel that it’s worth going out, versus shopping on-line. For retailers, that comfort might in part be derived from visible occupancy monitoring efforts and automated voice-down messages when people aren’t wearing masks or keeping their distance.