The biggest threats to your company’s cybersecurity are not the dark, hooded figures that have come to represent hackers on TV commercials. In fact, neither are they actual hackers.
Category: Policies and Training
Your security initiatives are only as effective as the policies and training designed support them. Look here for advice on crafting strong cyber and physical security policies as well as best practices for communicating these policies through proper training.
When it comes to compliance, keeping your data secure should be one of the biggest priorities for your business. How can different companies with different requirements make sure they are compliant?
The technological landscape has changed drastically since the turn of the century. With thought leaders in Silicon Valley and young entrepreneurs looking to disrupt the technology marketplace through continual development, it seems like there is no end in sight to these changes. One outcome of this ceaseless development is that C-suite security and information executives […]
People who have not had the misfortune to be involved in an active shooter situation may not realize how difficult it is under the extreme stress of that event for the employees, students, or the public to actually recognize the arrival of law enforcement. Because different agencies wear different uniforms, colors, and styles, it may […]
The modern technological era is one where organizations are continuously threatened by online hackers. These threat actors have become more intelligent, and by using a combination of new tools, old tricks, and perseverance, they remain adept at breaking through increasingly secure endpoints.
Although it may feel like an eternity, it wasn’t that long ago that spam was the biggest problem for corporate e-mail inboxes. A lot has changed in 15 years. While a majority of those older spam e-mails were not malicious, they did bog down end users and servers alike. As the marketplace for spam and […]
Do you remember the parable of the blind men and the elephant? Each individual forms an incorrect conclusion about what an elephant is based on the limited information they have. The man touching the elephant’s tail concludes that an elephant is like a rope, while the man touching its tusk believed that the elephant was […]
We can define an “active shooter” as someone who enters the workplace or a school campus with a gun. We can also define a “mass attacker” as someone who comes to the workplace, school, or public place with lethal intent and may be armed with an edged weapon, a bomb, or who uses a vehicle […]
It’s not really news to CISOs looking to hire cybersecurity talent that there are simply not enough qualified applicants for open positions. Postings for cybersecurity jobs tend to linger for months, and recent studies show that the gap between the demand for cybersecurity talent and the actual supply is only going to grow. Estimates from […]
Are you ready to take your security projects – and career – to the next level? It takes more than just knowing the technology; successful project management involves budgeting, client management, timeline execution and more.