Kevin Wilkes never thought that he would work in enterprise security. But thanks to a want ad that called for police officers, Wilkes is enjoying his role as CSO for the Pittsburgh Cultural Trust, a non-profit arts organization that works to make the city of Pittsburgh a place where the arts can flourish.
In late August, the Orlando City Soccer Club played its first game since its games and operations shut down in the spring due to COVID-19. It was a great evening, says Robert Schnettler, who is Senior Director of Security and Guest Services for the club and Exploria Stadium.
Christopher Schleder — who had completed six years of active duty in the U.S. Air Force and was unsure about his next career move — knew about the facility before he applied for a Director of Security Services role because his dad had been a patient for several years.
Treyler Ray began his career in law enforcement with the Mississippi Bureau of Narcotics as an undercover narcotics agent. He soon moved into the special operations division where he conducted surveillance and Title III wiretaps on major drug traffickers. F
Working in healthcare was never on my radar,” says Luke Manuel, Security Director for Rockcastle Regional Hospital and Respiratory Care Center in Mount Vernon, Ky. He spent 8 ½ years in the U.S. Marine Corps, before earning his bachelor’s degree in Assets Protection and Security with a focus on critical infrastructure.
After serving our country for 10 years in the Marine Corps, Joey Hunter was ready to be a prison guard. The career path appealed to him and the job interview was set.
While the first thing that may come to mind is attacks on voter booths and polling data, hackers were expected to hit more vulnerable targets first, such as community-based organizations and systems supporting political campaigns.
These networks are rarely designed to withstand the ransomware threats much larger, established political bodies face, and hackers know it.
Here, we talk to Doug Matthews, Vice President of Product Management for Veritas, about the conditions impacting data protection during the election period.
Estimated at 40% of all internet traffic, bots perform a variety of both critical and criminal operations. The sophistication of emerging bots is creating problems for traditional detection tools.
Cybercriminals quickly weaved the pandemic into their email scams earlier this year, and more recently impersonated the IRS by pretending to share updates about COVID tax relief in an attempt to steal sensitive tax information. In mid-April, Google’s Threat Analysis Group reported that they detected 18 million COVID-19 themed malware and phishing emails per day. And that’s without including all the email impersonation, invoice fraud, and phishing attacks that have nothing to do with COVID, but are dangerous nonetheless.
In this article, I will provide some tips to help individuals and organizations communicate more securely over email.
With the fall season underway and winter looming, states across the U.S. are opening up their grants for applications. There are a number of different programs and types of security grants that organizations can qualify for.