As the pandemic continues to unfold, many schools have chosen to conduct classes virtually rather than in-person and school buildings have been left empty for durations longer than ever before. With less staff consistently working on school grounds, it can be easy to miss a potentially costly and time consuming emergency. Situations like a leaking pipe or a malfunctioning freezer can quickly go from a minor issue to a major problem if not dealt with as soon as possible. Without physical eyes on these situations, schools need to consider leaning more heavily on technology that can be their eyes and ears, such as environmental monitoring technologies that can allow administrators to monitor their school at all times, even when they’re not on-site.
Too often, decision-makers overlook the strategic value and potential in replacing outdated radios that severely limit real-time collaboration and emergency preparedness. In truth, security teams can no longer rely on the radio technology that hasn’t changed since the 1990s. These six reasons demonstrate compelling evidence that radios are ill-equipped to provide today’s security teams with the situational intelligence they need in a high-tech world:
In 2017, Gartner predicted that the public cloud computing industry would be worth $236 billion by 2020, as its demand, driven by the growing number of businesses recognizing cloud computing as a data center solution, seems to surge. And for good reasons. Cloud has proven to offer enhanced stability, security, flexibility, and cost-saving.
Security magazine and its partner for the Top Cybersecurity Leaders, (ISC)², is looking for enterprise information security executives, who have made and continue to make significant contributions in the cybersecurity space to their organizations and/or the enterprise-level information security profession.
Meet Ian Thornton-Trump. He is the Chief Information Security Officer at Cyjax, and an ITIL certified IT professional with 25 years of experience in IT security and information technology. As CISO Cyjax, Ian has deep experience with the threats facing small, medium and enterprise businesses. His research and experience have made him a sought-after cybersecurity consultant specializing in cyber threat intelligence programs for small, medium and enterprise organizations. In his spare time, he teaches cybersecurity and IT business courses for CompTIA as part of their global faculty and is the lead architect for Cyber Titan, Canada's efforts to encourage the next generation of cyber professionals.
Attorney General Kathy Jennings announced that Delaware has joined a total $17.5 million settlement against Georgia-based retailer The Home Depot, resolving a multistate investigation of a 2014 data breach which exposed the payment card information of approximately 40 million Home Depot consumers nationwide. Through the settlement The Home Depot has reached a resolution with 45 other states and the District of Columbia. The DOJ’s Consumer Protection Unit helped secure the settlement.
The year 2020 has been a whirlwind of adaptation and change, prompting the phrase “business as usual” to take on a whole new meaning. The Center for Internet Security, Inc. (CIS) has become a leader in supporting both public and private organizations in the COVID era, when many are shifting more of their workforce remote and more of their workloads to the cloud. 2020 also marks a milestone for the Center for Internet Security, as CIS is celebrating its 20th anniversary this month.
NSA’s National Cryptologic Museum (NCM) is thriving and plans to keep growing as it welcomes a new Director. Dr. Vince Houghton, who brings a deep background in intelligence and history, joined the Agency last month after serving as historian and curator of the International Spy Museum in Washington, D.C. Dr. Houghton said he already is impressed with the professionalism of the current staff.
With more commerce occurring online this year, and with the holiday season upon us, the Cybersecurity and Infrastructure Security Agency (CISA) reminds shoppers to remain vigilant. Be especially cautious of fraudulent sites spoofing reputable businesses, unsolicited emails purporting to be from charities, and unencrypted financial transactions.
Content-centric solutions that evaluate each message based on how likely it is to be bad create a gap through which identity-based email attacks can slip. A zero-trust email security model is vital to closing that gap. Zero-trust may also be characterized as zero-assumption.