We’ve all used different types of entrances as we move about in the world: swing doors, sliding doors, revolving doors, gates and turnstiles. Aside from providing access into buildings, how many people consider that certain types of entrances can reduce costs and sometimes create opportunities to make money?
Essentially, one-third of analysts’ time is being spent on processing alerts that have unknowingly already been processed, and at present SOC teams are left with little ability to make this distinction resulting in massive manpower drain.
Even brick and mortar companies are increasingly leveraging the internet and cloud services to expand their business. As traditional business models have changed to incorporate these resources, the security risks presented have evolved as well. In today’s world of digital business, the security risks faced by the majority of companies have largely shifted into the cyber realm.
Airport authorities might consider augmenting existing practices with a program to help prevent, detect and mitigate insider threats. Such a program recognizes the airport for what it is – a complex ecosystem of airlines, vendors, contractors and airport employees – and provides a way for this community to come together to protect the aviation transportation system. In a sense, the airport community becomes an insider threat working group.
While an organization’s CISO focuses on cybersecurity, they depend on the C-suite to combine business operations and necessary security measures to find success.
Social media is transforming corporate security in fundamental ways. Here are five trends that chief security officers, intelligence analysts and others need to consider when building a social media strategy.
Climate change is likely to pose a significant national security challenge for the U.S. over the next two decades by heightening social and political tensions, threatening the stability of some countries and increasing human health risks, according to a government report released September 21.
Visa’s Biometric Paymentsstudy, which surveyed 14,000 people across Europe, revealed that 73 percent of people think biometric security checks on a payments device is a secure authentication, with fingerprint the preference for 81% of consumers, followed by iris scanning.
The practice of conducting employment background screening has been around a long time and has become ubiquitous that it is inexplicably tied to the employment hiring process.
Technology moves quickly, as military and commercial tools and toys merge with security applications to create both new solutions and risks for the enterprise. What should you be on the lookout for this year?