Paul McCartney wrote “The Long and Winding Road” while the Beatles were in the throes of dissent and months away from breaking up. Listening now to the song’s yearning lyrics and plaintive melody, is it possible that Sir Paul actually anticipated the NIST Cybersecurity Framework’s Recover function, and was imagining the category titled Recovery Planning?
The looming shadow of terrorism is pervasive. The recent suicide attack that targeted a music concert in Manchester, UK; the vehicle attack in London, UK, two months prior; and compounded further by regular images across the media of marauding attacks in cities such as Paris and Berlin.
We all know that technology never remains at a standstill. But how do you keep pace with the latest innovations in surveillance systems without breaking your budget?
In late February 2017, Oklahoma City Police Officers responded to a call of alleged illegal activity, where, soon after their arrival a foot chase pursuit began of a suspect who fled the scene.
The same secure chip technology that’s been rolled out in the banking world for ATM and credit card transactions is sweeping across sectors throughout the American economy.
Historically there has been a shortage of college and university-level education programs focused on the knowledge, skills and competencies required for effective management of corporate security risk-related activities.
If at first you don’t succeed, try, try again.” Although catchy, we all know that the real keys to success after failure are reflection and adaptation, not mere persistence.