Ransomware attacks are on the rise – and they are getting more and more sophisticated and destructive. That is bad news for executives struggling to maintain a high level of cybersecurity even as their organizations continue to cope with the massive impact of a pandemic.
Today, Zero Trust is the subject of much discussion and debate; for instance, is Zero Trust doable in reality or more so in theory?
As many are aware, Zero Trust is a concept that deems everyone (employees, freelancers and vendors) and everything (datacenters, applications and devices) must be verified before being allowed into a network perimeter – whether they are on the inside or the outside of an organization.
Enhanced analytics, intrusion detection, broad surveillance, access control, facial recognition - a few of the solutions explored here to help with all airport and seaport applications.
There are currently a multitude of different standards and regulations to address the urgent need to secure our connected world, yet it's time to create a unified global conformance assessment.
We talk to David “moose” Wolpoff, Chief Technology Officer (CTO) and co-founder of Randori, about Black Hats’ processes for finding and exploiting weaknesses in software.
If you've done your job correctly, you will never ask "now what?" when a cyberattack occurs, because you'll already have an incident response plan in place that prescribes exactly what you need to do.
Faith-based institutions need to be welcoming and inclusive with their duty of care to provide a safe space for worship, even with constraints on safety and security budgets in a non-profit environment.
After 11 years, 135 columns and more than 250 feature articles and cover stories…it is time for me to say goodbye as Editor-in-Chief of Security magazine.
Security magazine is pleased to announce our 2020 Most Influential People in Security – 22 top security executives and industry leaders who are positively impacting the security field, their organization, their colleagues and peers, and the national and global security landscape.
Security professionals who are considering the potential direction for their private sector career often overlook certain functional areas. While considered part of a security leader’s portfolio, many of these less obvious choices offer a broad diversity of challenges. One of these areas found in almost every industry sector is investigations.