Ready to build a Global Security Operations Center? Learn how three enterprise securty teams created and built GSOCs, and how they are using them to mitigate global risks.
Found at the top of many a list come January are the words “find a new job.” The resolution is a perennial favorite appearing year after year. It generally occupies a highly-ranked slot if it is on the list, but what are your odds of successfully achieving it?
This question came up during the Security 500 Conference last November, and it is still sticking with me. I don’t think you’ll find an easy or consistent answer.
Happy New Year! We have turned the calendar to 2019, but the New Year doesn’t take away security risks, and according to one survey, workplace violence, marijuana use and cybersecurity will be at the top of the list.
This year was laden with cybersecurity challenges pertaining to “opportunistic attackers” and attempts to compromise individuals’ computers for credentials and financial information harvesting.
Applying security technology to business continuity and operational efficiency was a major theme for 2018, and will be especially important in 2019. As technology is an integral part of business operations - and with cybersecurity risks at an all-time high - many organizations are utilizing their security platforms beyond traditional applications to improve operations and increase efficiency.
When the prestigious Aloft Dubai South in the United Arab Emirates opened on October 15, 2018, guests, visitors and staff at the new hotel were already protected by an advanced video surveillance system with Arecont Vision Costar megapixel cameras.
Enterprise decision makers know to “expect the unexpected” when it comes to business continuity planning. But the increasingly complex threat environment is challenging organizations as never before to prepare for an expanding range of incidents.
Despite gradual industry acceptance of two-factor authentication (2FA), many consumer websites still don’t provide a full set of 2FA options—including easily accessible and clear-cut information for users—according to a recent study.
Criminal cyber activity evolves at an incredible pace. Today’s cybercriminals are constantly on the lookout for security gaps that will give them access to your facilities or a wide range of important, private and sensitive information. In our increasingly interconnected world, the potential avenues of exploitation seem greater than ever.