Embedding cellular technology in a business continuity plan allows organizations to scale the network as needed, offers further security for those outside the corporate walls and ensures IT teams can more easily monitor and resolve any potential issues faster and easier. The workforce of tomorrow will see remote work security and cellular connectivity go hand-in-hand.
Whether it's fever detection or no-touch visitor management, what are some new solutions that may help protect an enterprise's assets and properties during COVID-19?
Microsoft's Azure Security Center (ASC), which regularly searches for and researches for new attack vectors against Kubernetes workloads, revealed a new campaign that was observed recently targeting Kubeflow, a machine learning toolkit for Kubernetes.
A new report, COVID-19, Conspiracy and Contagious Sedition: A Case Study on the Militia-Sphere, details how the Militia-sphere’s messaging has grown increasingly extreme as the pandemic has progressed, to the point of threatening and enacting violent attacks.
The Campbell University College of Arts and Sciences has announced the formation of a new academic department, the Department of Security and Computing, which will house cybersecurity, homeland security and ITS programs.
Bob Olsen, Senior Managing Director, has been appointed Global Head of Cybersecurity and Privacy at Ankura, global business advisory services firm. Based in Baltimore, Olsen will be responsible for supporting the continued expansion and growth of the firm’s cybersecurity and privacy practices in both existing and developing markets.
Honda's global operations have been hit with a ransomware attack. The company said earlier that the attack had affected operations at several facilities, as well as both customer service and financial services operations.
What are seven concrete steps you can put in place to address visitor management in this crisis situation and during your recovery phase for re-entry to the office?
Video surveillance systems have always been vulnerable to attacks. Ever since IP technology was first introduced, security cameras have been an attractive target for hackers.