Skip to content

General

All discussions that don't fall under a specific category

3.7k Topics 3.7k Posts
  • 0 Votes
    1 Posts
    72 Views
    CerberusC

    Security awareness should be an ongoing campaign, not just an event. That campaign, just like any marketing campaign, starts with a thorough understanding of the target audience — the people you wish to influence to adapt security best practices.

    https://www.securitymagazine.com/articles/96584-try-creating-employee-personas-to-customize-your-security-communications-efforts

  • 0 Votes
    1 Posts
    52 Views
    CerberusC

    The Refuge of Hope Ministries homeless shelter uses an access control system from Sielox to secure its facilities. Read more in this case study.

    https://www.securitymagazine.com/articles/96583-access-control-secures-ohio-homeless-shelter

  • 0 Votes
    1 Posts
    66 Views
    CerberusC

    Michigan State University (MSU) has introduced the SafeMSU app and Police and Public Safety Advisory Committee to improve campus security.

    https://www.securitymagazine.com/articles/96582-michigan-state-adds-safety-app-and-police-advisory-committee

  • 0 Votes
    1 Posts
    66 Views
    CerberusC

    Where are the best cities for IT security analysts? New rankings from AdvisorSmith compare average salary, cost of living and cybersecurity job density to find cities in the U.S. best suited for IT security careers.

    https://www.securitymagazine.com/articles/96581-the-10-best-us-cities-for-it-security-professionals

  • 0 Votes
    1 Posts
    47 Views
    CerberusC

    The Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation are reminding critical infrastructure partners to stay vigilant against threats during holidays and weekends.

    https://www.securitymagazine.com/articles/96568-cisa-issues-holiday-warning-critical-infrastructure-stay-vigilant

  • 0 Votes
    1 Posts
    61 Views
    CerberusC

    John Kreul will oversee the operations and strategy of Jewelers Mutual Group’s technology department as the insurance provider’s Chief Information Officer.

    https://www.securitymagazine.com/articles/96572-john-kreul-joins-jewelers-mutual-group-as-chief-information-officer

  • 0 Votes
    1 Posts
    87 Views
    CerberusC

    Federal bank regulatory agencies approved a rule to improve the sharing of information about cyber incidents that may affect the U.S. banking system.

    https://www.securitymagazine.com/articles/96560-banks-now-required-to-report-cyber-incidents-no-later-than-36-hours

  • 0 Votes
    1 Posts
    40 Views
    CerberusC

    Save the date for the Innovation Institute for Fan Experience (IIFX)'s virtual town hall, “Fan Behavior Challenges and Solutions.”

    https://www.securitymagazine.com/articles/96569-iifx-to-host-virtual-town-hall-on-fan-behavior-in-december

  • 0 Votes
    1 Posts
    49 Views
    CerberusC

    Today’s security threat landscape necessitates that security leaders work on an ongoing, effective security awareness program, tackling the inherent challenge of employee participation.

    https://www.securitymagazine.com/articles/96565-security-awareness-training-top-challenges-and-what-to-do-about-them

  • 0 Votes
    1 Posts
    38 Views
    CerberusC

    By shifting to data-centric zero trust with innovative solutions that integrate enhanced levels of control to data security, organizations can boost their ability to prevent breaches, defend against attacks, and combat increasingly sophisticated cybercriminal enterprises.

    https://www.securitymagazine.com/articles/96567-why-network-based-zero-trust-doesnt-protect-your-most-valuable-assets

  • 0 Votes
    1 Posts
    40 Views
    CerberusC

    While relying on passwordless authentication is both easier and safer for IT and end users, the transitional period is everything but.

    https://www.securitymagazine.com/articles/96566-passwordless-made-simple-with-user-empowerment

  • 0 Votes
    1 Posts
    53 Views
    CerberusC

    Securing physical or digital assets are at the heart of reducing enterprise and business risks. Identity management solutions help enterprises verify a user’s identity and ensure that only authorized users access facilities, applications, systems or networks. Let’s explore a sampling of the latest identity management solutions.

    https://www.securitymagazine.com/articles/96570-product-spotlight-on-identity-management-solutions

  • 0 Votes
    1 Posts
    70 Views
    CerberusC

    A recent test of artificial intelligence (AI) designed to identify illegally trafficked animals and animal products in air cargo and baggage proved successful in over 70% of cases. The AI model represents a collaboration between Smiths Detections, Microsoft and the Heathrow Airport.

    https://www.securitymagazine.com/articles/96564-ai-tracks-illegal-wildlife-trafficking-at-heathrow

  • 0 Votes
    1 Posts
    56 Views
    CerberusC

    Once described as “the world’s most dangerous malware,” Emotet, has allegedly returned and is being installed on Windows systems infected with TrickBot malware.

    https://www.securitymagazine.com/articles/96559-emotet-malware-returns-heres-what-to-look-out-for

  • 0 Votes
    1 Posts
    71 Views
    CerberusC

    In a data breach of California Pizza Kitchen, personal data from over 100,000 employees including names, Social Security numbers and other identifying information was accessed by cybercriminals. Security leaders around the globe give their insights into the cyberattack.

    https://www.securitymagazine.com/articles/96561-100-000-california-pizza-kitchen-employee-ssns-compromised-in-data-breach

  • 0 Votes
    1 Posts
    54 Views
    CerberusC

    https://www.securitymagazine.com/articles/96558-70-of-security-pros-find-security-hygiene-and-posture-more-challenging

  • 0 Votes
    1 Posts
    58 Views
    CerberusC

    From app usage to location data, developers are siphoning consumer data and selling it to data brokers and advertisers for top dollar. And while this data may be inconsequential, at its core, this issue is about consumers’ right to privacy.

    https://www.securitymagazine.com/articles/96557-the-unforeseen-risks-of-sharing-smartphone-location-data

  • Mitigating the risk posed by remote work

    1
    0 Votes
    1 Posts
    48 Views
    CerberusC

    In a remote or hybrid environment, employers have less visibility into employee activity, and as a result, the risk has greatly increased.

    https://www.securitymagazine.com/articles/96556-mitigating-the-risk-posed-by-remote-work

  • Document protection and insider threats

    1
    0 Votes
    1 Posts
    49 Views
    CerberusC

    When it comes to insider threats and document protection, security leaders can take a few practical steps to mitigating both intentional and unintentional breaches.

    https://www.securitymagazine.com/articles/96555-document-protection-and-insider-threats

  • 0 Votes
    1 Posts
    36 Views
    CerberusC

    Listen to the latest The Security Podcasts episode as we talk with Stephanie Jaros about insider risk, building an appropriate program, and the criticality of when to address such threats.

    https://www.securitymagazine.com/articles/96539-listen-to-stephanie-jaros-of-the-dods-counter-insider-threat-program