Jeff Spoerndle, Vice President of BEST Crowd Management, who has led efforts to ensure training is provided to employees on emergency response in a high-threat situation, discusses the potential threat of domestic violent extremism at large events and critical safety considerations for venues.
Board members are often entrusted with sensitive data and information, which ensures they can be effective in their roles. But if that data gets into the wrong hands, the organization could run into costly legal trouble and reputational damage.
Some of the country’s leading technology companies have committed to investing billions of dollars in strengthening cybersecurity defenses and in training skilled workers, the White House announced, following President Joe Biden’s private meeting with top executives.
Many agencies don’t have the ability to collect, centralize and analyze all the data from remote endpoints. Even if they do, the data collection is not fast enough. Enter the American Rescue Plan and capitalize on it to boost your security infrastructure.
Editor Maggie Shein sits down with Jadee Hanson, Chief Information Security Officer and Chief Information Officer at Code42 about her career start in pentesting, as well as how to address data loss when it comes from the inside your organization, and navigating insider threat.
With hurricane season quickly approaching us, it gives us a chance to stop and think about how well prepared we are for disasters of all kinds. A solid, well-tested disaster recovery (DR) plan is the difference between your company surviving a natural disaster – or ceasing to exist the moment it happens.
How do you find, hire and create the perfect threat hunter team? Troy Gill, Manager of Security Research and Zix’s AppRiver Threat Research Team, speaks to what it takes to be an exceptional threat hunter and what qualities they need to be successful.
Jesse Kinser has been named Chief Information Security Officer at Pathwire. Kinser will lead a team of security professionals to establish a creative approach to grow the security posture of the organization.
Vulnerability remediation can feel like an ever-escalating game of whack-a-mole. Security teams need to work smarter, not harder, to stay ahead of the onslaught of new vulnerabilities. Effective prioritization is a key step to identify the big rocks that need to be fixed first.