The first step in creating a complete data security plan is to know what types of data the company collects, where it is stored, and with whom and how it is shared. Next, the business should determine the potential risks to that data and whether the information resides in electronic or physical form (or both).
The Museum of the Bible adapted their access control system to suit the new restrictions caused by the COVID-19 pandemic, adopting a system from Qylur. Check out the physical security case study here.
Andhra Pradesh, an Indian state with over 55 million residents, is home to a centralized governance and security center. A video management system from Videonetics helps secure the area.
The Security Industry Association has released its 2022 Security Megatrends, which highlight security topics for business leaders in all industries to watch.
Workplace violence is an unfortunately frequent part of the healthcare industry, with over 75% of physicians reporting having experienced intimidation, harassment or violence while on the job. The Ontario Medical Association and the Canadian Medical Association have released guidance on how to mitigate the threat.
What should security leaders focus on as they look to 2022? Organizational resilience, reputational risk and cybersecurity all will play major roles in enterprise security.
Listen to the latest The Security Podcasts: Women in Security edition as we sit down with security veteran Pamela Perini to discuss risk assessments and the importance of certifications.
Check out five tips on how to execute a successful ransomware tabletop exercise, including how to identify key participants and ensure representatives from core business and operations teams are involved.
If hackers can learn the ins and outs of your network, shouldn’t you beat them to the punch by obtaining deeper visibility and holistic mapping of your network infrastructure and attached applications, services, and devices?
Devo Technology announced the results of its 3rd annual SOC Performance Report (SPR), a survey on the current state of security operations center (SOC) performance.