While the tools available to educators looking to integrate technology into the classroom are now better than ever before, there are still security considerations to take into account when implementing a digital curriculum
The cost of a typical cyber breach to an American company is much less than generally estimated, providing one possible explanation for why companies do not invest more to improve computer security, according to a new RAND Corporation study.
Technology moves quickly, as military and commercial tools and toys merge with security applications to create both new solutions and risks for the enterprise. What should you be on the lookout for this year?
Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway.
As critical infrastructure in the United States becomes more dependent on networked systems, such as the smart grid, the electricity industry is at risk for new avenues of attack.
Technology has become ingrained in enterprise security operations.
December 1, 2013
Like most other segments of the business world, technology has become ingrained in enterprise security operations. With that increased use of technology comes a new set of risks.
Here’s a sure-bet, good news 2013 prediction: No more political ads on TV, at least for a while.
Still, next year will hold plenty of ups and downs for enterprise security leaders, which include innovations that will help you to reduce enterprise risk. The Tonight Show’s Jay Leno and CEO Gary Shapiro know. Researcher Michela Menting and economist Bart van Ark have their perspectives on the near future as does Gartner Fellow David Cearley.
As a general rule, forecasting is a bit of guessing. Even economists, whose job it is to make sense of hardcore data and then give solid analysis, often are reduced to intelligent guessing. But security leaders know better. They know what they’ll likely face in 2012, namely terrorism, workplace violence, fraud, cybercrime, regulatory compliance, natural disasters, theft, intellectual property, brand protection, budget concerns and more – the same trends identified in Security magazine’s 2011 Security 500 report.