In part 1 of this series, we covered why Distributed Internet of Things devices are attractive and vulnerable targets for cyber criminals and hackers. Now we turn our attention to strategies for protecting these devices, which in turn, helps to protect your entire network.
Network administrators have long been stretched thin in their attempts to maintain global endpoint security settings, configurations and patching. Now that most, if not all, of their organization’s employees are connecting remotely, the job has become even more difficult.
The Centers for Disease Control and Prevention released new guidelines when it comes to workplace violence, including how or how not to confront anti-maskers.
The American Academy of Pediatrics warns that realistic active shooter drills can unnecessarily traumatize children and that schools should stop running them or carefully plan for their needs.
We talk to Richard Bird, Ping Identity's Chief Customer Information Officer (CCIO), about how prepared the U.S. Government is for the 2020 Presidential Election.
The Internet of Things (IoT) is transforming our homes, businesses and public spaces – mostly for the better – but without proper precautions IoT devices can be an attractive target for malicious actors and cyberattacks. Security threats involving IoT devices often stem from the fact that many IoT devices usually have single-purpose designs and may lack broader capabilities to defend themselves in a hostile environment. For example, a door bell, a toaster or a washing machine frequently do not contain as much storage, memory and processing capability as a typical laptop computer.
The non-profit International Foundation for Cultural Property Protection and consultancy and training firm Trident Manor Limited entered a strategic partnership to deliver specialized cultural property protection learning programs, as well as increase mutual support for the protection of cultural heritage globally.
While cyber threats continue to be a massive drain on business productivity, there is another, less obvious vulnerability: unintentional employee error. Indeed, a majority of businesses say that simple human error is their leading cause of data loss.
Here, we talk to Mohit Tiwari, CEO and co-founder of Symmetry Systems, about the current threat landscape, the role of CISOs and the unique challenges COVID-19 and work-from-home (WFH) pose to CISOs and security teams.
Regardless of industry, no company can escape the widespread reach and impact of data. Whether a company is collecting account information from customers or aggregating platform usage data, handling large amounts of data has become the norm. While this creates boundless new opportunities for businesses in analytics and real-time decisioning, it also introduces new risks that organizations need to consider and prevent where possible.