The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Industry advancements that enable smartphones to carry credentials offer the opportunity for students, faculty and staff at university campuses to use a ubiquitous device to open doors and perform other tasks that require presentation of a secure credential.
Recently, a group of leading automakers agreed to guidelines aimed at safeguarding the burgeoning volumes of sensitive information being collected by today’s vehicles.
Has investigative reporting turned against the security officer? According to Mark Fidelman, biases embedded in news reports can give your security team an undeserved bad reputation.
From an executive-level perspective, the greatest shift in cybersecurity relates to the focus and the responsibility – moving from strictly an “IT issue” to one of a business function. Look no further than the Target breach and the subsequent resignations of the company’s CEO and CIO to see how cybersecurity has escalated to the C-suite. This was unprecedented 15 years ago, when the primary cybersecurity role of IT was information assurance. So why has the philosophy changed?
In August 2013, Former Assistant Defense Secretary for Homeland Defense & Americas’ Security Affairs, Dr. Paul Stockton sat on a panel that discussed cybersecurity challenges facing the electric sector and some of the vulnerabilities in the U.S. electric grid system.
Today, as we remember the terrible events of the morning of September 11, 2001, the staff of Security magazine is considering how far we have come, and how far we have left to go.
As the industry continues to grow, there is an increased need for sophisticated recruiting, screening and hiring processes, as well as a strict commitment to hiring quality personnel who are the right fit for the position.