Starting last August, we began the current series of articles to provide our readers with a deep dive into the NIST Framework and its approach to Identify, Protect, Detect, Respond to and Recover from cybersecurity incidents.
A crisis situation on school grounds can come in many forms. From devastating campus gun violence to carbon monoxide leaks that can leave students and staff ill, the outcome of any crisis situation depends largely on how prepared the school is beforehand.
An emphasis on officer service partnerships is the formula for Time Warner Cable’s Brian Reich, director of security for the Northeastern U.S., and that requires two-way communication.
When the Allegheny County Housing Authority’s old surveillance system proved more of a hindrance than a help in providing security, Chief Michael Vogel invested in a new hybrid solution.
Websites and Web applications are the most visible and vulnerable part of a company’s infrastructure so it’s no surprise that cybercriminals scan thousands of websites every hour in search of vulnerabilities.
Cybersecurity coverage has taken an odd turn. In the not-so-distant past, when a data breach occurred, journalists would zero in on the kinds and amounts of data that were stolen, and the amount of reputation and bottom-line damage the breach would likely result in. Lately, though, focus has shifted to who perpetrated the breach rather than how it happened.