Meet the women leading the security, cybersecurity and business continuity functions at Bristol Myers Squibb. Prioritizing inclusion has fostered diversity of thought and strengthened decision-making throughout the organization.
Security sits down with Lisa Sullivan, Senior Vice President of Travel and Transport at IDEMIA, to discuss how to preserve personally identifiable information (PII) of passengers at checkpoints.
Security chats with Oliver Tavakoli, CTO at Vectra, about the future of remote work and cybersecurity risk management frameworks security leaders should rely on to ensure proper security.
Cybersecurity leaders are concerned that attackers could further weaponize the Log4j security vulnerability by creating a "worm" that spreads automatically from one vulnerable device to another.
Threat actors are actively exploiting a critical security flaw in Java logging library Apache Log4j. Log4j is an open-source, Java-based logging utility widely used by enterprise applications and cloud services, meaning many organizations are at risk from threat actors actively exploiting this vulnerability.
As the year ends, Security magazine spotlights the security industry’s latest solutions below. Innovative products, services and technologies not only help security leaders thrive in their roles, but also keep people and assets safe to create more secure, efficient and intelligent organizations.