The best way to prevent scripting attacks, such as those that implement Python back doors or compromise PowerShell, is to implement identity-based zero trust. In a zero trust environment, IT treats the internal network as if it were the public internet, a place where nothing can be trusted, and anything can be a threat.
Michigan Governor Gretchen Whitmer announced the "Futures for Frontliners” program to provide a tuition-free pathway to college or a technical certificate to essential workers who don’t have a college degree.
What are some key areas to consider when you are constructing a strategy to address your successor and the replacement of other positions within your direct and functional organization?
In the video surveillance world, data is growing rapidly due to the proliferation of surveillance cameras in both public and private spaces, the increased use of police body cameras and dash cams, and ever higher-resolution on all of these. In the U.S. alone, the surveillance marketplace is expected to grow to $68 billion by 2023.
A John Jay College of Criminal Justice project on cyber-terrorism is one of 13 selected by the Department of Homeland Security as part of the National Counterterrorism Innovation, Technology, and Education (NCITE) Center, a new DHS Center of Excellence. The project will be housed at the University of Nebraska at Omaha.
Ransomware is costing businesses—in ransom, yes, but also in downtime, the cost of which is typically 23 times greater than the ransom requested. The attacks are affecting large organizations and cities including Atlanta and Baltimore. Cybercriminals aren’t just attacking end-users; MSPs are the latest on the hit list.
While employees are the key to identifying cybersecurity vulnerabilities quickly, many companies have failed to create a welcoming environment for whistleblowers. During COVID-19, how can you safely blow the whistle?
To detect and contain breaches faster, it’s become increasingly important to go beyond the typical malware detection capabilities and invest in the ability to detect and react to lateral movement within the environment. Lateral movement is a core piece of an attacker’s strategy once he’s gained a foothold within the environment. What three steps can you take to help stop lateral movement focus on security measures that minimize dwell time?
Ransomware. It may be the most feared word of security and risk managers. After countless headlines and costs of over 11.5 billion dollars in 2019 alone, organizations around the world are understandably terrified of being hit by a ransomware attack. What are four steps you can take to protect against ransomware?
Last year, ASIS International released the Enterprise Security Risk Management (ESRM) Guideline, which takes a different approach to traditional security. The ESRM Guideline was released at the 2019 Global Security Exchange (GSX) in September, and the Maturity Model is now available on the ASIS website.