Category: Emerging Issues in Security

Security is constantly evolving, and it’s important for professionals to stay up to date. We provide the latest news, opinions, trends, case studies, strategies, and legislative and regulatory developments that could have an impact on the field.

Data Privacy Violation Concept

How Secure is Your Virtual Private Network?

Remote work has become a reality at many companies, and as such, Virtual Private Networks (VPNs) are a key component of many organization’s cybersecurity tool kits. VPNs designed for enterprise use go well beyond those marketed at consumers in either the Google Play or App stores which can mask your location and identity while waiting […]

Crushed opiates and pills on floor next to man holidng syringe

Fentanyl Exposure is a Major Concern for First Responders

The ongoing opiate crisis continues to have dramatic impacts on communities across the country, and first responders increasingly find themselves walking into unknown and potentially dangerous situations. The use of synthetic opioids such as fentanyl (and its analogs) as alternatives to or additives in street drugs is one factor elevating that risk. The National Institute […]

Young woman at a job interview.

Can Technology Help Close Your Organization’s Cybersecurity Talent Gap?

The current job market is hot, and with unemployment at a low, many employers are struggling to attract top talent. While most industries are struggling to recruit the best people, those who are looking for qualified cybersecurity personnel might need to dig deep into their reservoir of patience. Hiring managers tasked with posting cybersecurity jobs […]

shocked man in front of his computer

Web Browser Extensions Responsible for Massive Data Privacy Issue

If employees at your organization use a computer as a part of their day-to-day work, there’s a better than average chance that they spend some of their time using a Web browser. With the advent of enterprise-scale software solutions like Microsoft’s Office365 or Google’s G Suite, many workers must use a browser to get their […]

Exterior of US Citizenship and Immigration Services Headquarters

Working With ICE When They Arrive at Your Organization

Immigration authorities, as of Sunday July 14, have begun conducting raids targeting undocumented immigrants ordered by courts to be removed from the country.  The increased enforcement activity will center on these 10 U.S. cities: Atlanta, Baltimore, Chicago, Denver, Houston, Los Angeles, Miami, New York, New Orleans and San Francisco. We therefore thought it would be a […]

Design of a secure smart building

Taking a Softer Approach to Security in the Smart Cities of the Future

There is currently a lot of hype about the “smart cities” concept, and communities and governments around the world are jumping onto the bandwagon. While most of the focus is on eliminating inefficiencies in a variety of infrastructure systems–from transportation to utilities and beyond—the reality is a “smart city” should equate to a “safe city.”

CISO stands addressing team at board meeting

What Does it Take to be a CISO?

Because our society is teeming with technological innovation and prowess, the role of the Chief Information Security Officer (CISO) is becoming increasingly important for businesses globally. What does it take to work at the executive level in cybersecurity? To determine this, Varonis analyzed data from the CISOs of Fortune 100 companies.

IoT devices in an office

3 Major Security Risks of IoT Devices

The Internet of Things (IoT) has unlocked enormous benefits for users: unlimited remote control over personal items, streamlined experiences, and advanced tracking of personal health data. But, as our lives become increasingly intertwined with our digital devices, we’re exposed to new security risks.

15 notorious data breaches infographic

15 Noteworthy Cybersecurity Breaches

Security breaches have never posed a more serious threat than they do today. Hacking methods have become more sophisticated and more devastating with every passing year. While the cybersecurity industry does its best to counter the cyber-menace—whether through improved training or technological advancement— it’s ultimately a cat and mouse game and some determined hacker finds […]