The Security Industry Association (SIA), through its Ethics in Security Technology Working Group, has developed the SIA Membership Code of Ethics, a set of nine ethics principles designed to promote the highest standards of conduct among its members.
The path to securing the remote workforce should be seamless and experienced as a hassle-free balance between safety and a quality user-experience. It is pivotal to implement appropriate security practices, as inadequate measures can lead to unmanaged risks and the endangerment of corporate systems, data and employees.
Global technology association ISACA recently installed its 2020-2021 Board of Directors at its virtual Annual General Meeting, featuring a strong combination of executive expertise and association and chapter leadership experience.
Traditional network management approaches of multiple point products, manual change processes, monolithic policies and data silos no longer work. Business, risk, service and security assurance programs all need to be agile, efficient and anticipate future threats and remedies.
The spread of COVID-19 and the economic and trade disruption the pandemic has caused is prompting port managers to examine new ways to improve risk management and digital processes, according to the latest global ports survey conducted by Remy InfoSource.
The National Security Agency (NSA) and the Department of Homeland Security (DHS) have designated Georgia State University as a National Center of Academic Excellence in Cyber Defense Research and a National Center of Academic Excellence in Cyber Defense Education through 2025.
A Russian ransomware group whose leaders were indicted by the Justice Department in December is retaliating against the U.S. government, many of America’s largest companies and a major news organization, identifying employees working from home during the pandemic and attempting to get inside their networks with malware intended to cripple their operations, reports The New York Times.
Vectra® AI released its 2020 Spotlight Report on Healthcare, which shows an upward trend in exploitable behaviors and discredits claims that external threats would lead to increased internal threat activity.
Criminal hackers use a variety of techniques to get around current verification protocols involving passwords. Broadly speaking, they fall into three categories.
A new white paper from ISACA, ‘Supply Chain Resilience and Continuity: Closing Gaps Exposed in a Global Pandemic’, offers approaches that enterprises can implement to increase the resiliency of their supply chain.