Ignoring cybersecurity whistleblowers or, even worse, subjecting them to retaliation will not fix data security problems. Instead, it will only result in increasing an organization's legal exposure and driving cybersecurity whistleblowers to report externally.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime.
Bullies poison their work environment with low morale, fear, anger, gossip and depression. The employer pays for this in lost efficiency, absenteeism, high staff turnover, severance packages and lawsuits.
Workplace bullying is not a topic often explored by enterprise security professionals. However, this will likely change in the coming years, given the scope and the immensity of the problem.
Between security systems manufacturers, integrators and end users, is anyone fully prepared to mitigate cybersecurity risk?
April 1, 2017
Whether it’s an HVAC system, a point-of-sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property.
It’s difficult to pin down the number of organizations that utilize scenario-based training for security officers, but experts agree that this type of training appears to be increasing in use.
Airport security personnel spend most of their time preparing for active shooter incidents, insider threats and, in concert with the federal Transportation Security Administration (TSA), potential terrorist attacks. But on January 28, many of our nation’s largest airports had to handle an entirely different, unaccustomed scenario: mass protests over immigration policy.