The Taitung County Police Bureau in Taiwan uses video analytics to amplify manpower when it comes to surveillance. Learn more in this case study.
Security magazine sits down with Troy Fine, Senior Manager of Cybersecurity Risk Management and Compliance at Drata, to break down information security compliance myths.
Customer data is not the only thing on the line, as fraudsters utilize chat apps for scams. Businesses’ reputations are at risk too.
Google will pay an $85 million settlement to the State of Arizona for violating the state’s Consumer Fraud Act with its location tracking feature.
Setting clear expectations for new cybersecurity hires can help security teams with talent retention and developing secure organizations.
When mapping out career plans, security professionals can benefit from breaking down where they want to be and how they’ll get there.
Partnering across the enterprise and making strategic investments should be top goals for successful, business-minded chief security officers (CSOs).
Two former eBay security executives, James Baugh and David Harville, have been sentenced to prison for their roles in a harassment campaign targeting two business journalists.
Over $16 million has been awarded to North Carolina 911 dispatch centers for security technology improvements.
Leaders at the Bristol Zoo use video surveillance to identify damage to perimeter security and assist with wildlife conservation operations.
Software developers are under pressure to develop programs quickly, but security professionals must work with them to make sure APIs remain secure.
K-12 school safety leaders can use cyber education initiatives to train students and staff to avoid cybersecurity risks.
The COVID-19 pandemic accelerated e-commerce initiatives for small businesses, but it also catalyzed increased cyberattacks and cybersecurity challenges.
A survey from Nationwide identified weaknesses in small business cybersecurity posture, including a lack of employee cyber awareness and training.
Data privacy has grown so complex that it demands a technological solution, and it falls on cybersecurity and technology leaders to transform the way their organizations use data.
Identity and access management challenges facing organizations include disparate authentication practices, compliance and more, according to an Axiad survey.
The security community needs Cybersecurity Awareness Month, but we need to do it better in order to advance the mission of keeping people safe online.
Take a look at four women security leaders within Mayo Clinic’s Global Security team and how they propel the healthcare organization forward.
Several hacker groups are assisting protestors in Iran using Telegram, Signal and other tools to bypass government censorship.
Employee education, artificial intelligence and social media monitoring can help enterprise cybersecurity leaders combat deepfakes.