Security officers can get mixed messages from their contract clients, who often approve of posted orders for the site and the post location, and then ask the officers to contradict them. This is common when it comes to access control issues, asking employees, visitors, and vendors for identification or to check in, using previously approved […]
A data breach poses a severe threat to any company, whether it’s still developing or fairly established in the industry. Anyone can be the target of hackers—especially those companies who don’t take the necessary measures to protect their assets. Unfortunately, you can’t unscramble an egg: once a data breach happens, your company is compromised. However, […]
As 2018 creeps to a close, its time for thought leaders of all stripes to start prognosticating about what the cybersecurity landscape will be in the coming year. It’s a tall order, as this past year brought some complete surprises, including speculative execution vulnerabilities, the rise of cryptomining, the ransomware attack on the city of […]
Since the European Union’s (EU) General Data Protection Regulation (GDPR) took effect at the end of May, it’s been a waiting game to see what actions might trigger a major response. Although there has been an overall spike in complaints since the regulation took effect, there hasn’t been a large enough event to catch headlines […]
By Mary Shacklett Middle management can sometimes be a lonely and stressful place, and it’s no different for leaders in the IT department. It can be difficult to figure out how to move forward if you’re in a management rut—know the challenges, ask the hard questions, and try to find an antidote for the situation.