Skip to content

General

All discussions that don't fall under a specific category

3.7k Topics 3.7k Posts
  • 0 Votes
    1 Posts
    42 Views
    CerberusC

    Ethical hackers prevented 27 billion dollars worth of cybercrime from May 1, 2020 to August 31, 2021, according to Bugcrowd.

    https://www.securitymagazine.com/articles/96530-ethical-hackers-reduce-27-billion-in-risk-during-covid-19

  • 0 Votes
    1 Posts
    51 Views
    CerberusC

    A network-centric, autonomous response hardens cybersecurity defense in the distributed enterprise by reducing the attack surface and automatically eliminating potential threats before they can reach devices and information on a protected network.

    https://www.securitymagazine.com/blogs/14-security-blog/post/96526-network-vs-mobile-device-management-in-the-age-of-remote-work

  • 0 Votes
    1 Posts
    67 Views
    CerberusC

    There are several key attributes that any security or IT manager should consider before purchasing a video surveillance storage solution. Here’s a checklist as you’re reviewing the market’s options to ensure your critical needs are addressed prior to purchasing.

    https://www.securitymagazine.com/articles/96528-top-ten-checklist-identifying-your-next-video-surveillance-storage-system

  • 0 Votes
    1 Posts
    33 Views
    CerberusC

    Delaying the evolution of your organization’s security is a big mistake. As your organization scales, so does the magnitude of the security threats you face. To avoid costly growing pains, the time to start planning a modern security strategy is today.

    https://www.securitymagazine.com/articles/96527-eliminate-the-growing-pains-from-your-security-strategy

  • 0 Votes
    1 Posts
    46 Views
    CerberusC

    Kinamo Lomon, who has over twenty years of law enforcement experience, has been named the Director of Operations for Princeton University’s Department of Public Safety.

    https://www.securitymagazine.com/articles/96525-kinamo-lomon-named-director-of-operations-for-princeton-public-safety

  • Secure Equipment Act signed into law

    1
    0 Votes
    1 Posts
    33 Views
    CerberusC

    President Biden signed into law the Secure Equipment Act of 2021.

    https://www.securitymagazine.com/articles/96517-secure-equipment-act-signed-into-law

  • 0 Votes
    1 Posts
    57 Views
    CerberusC

    Email monitoring, video surveillance and keylogger software are some of the methods employers use to track productivity in the remote work environment. However, a new study from VMware, “The Virtual Floorplan: New Rules for a New Era of Work,” has found a higher employee turnover rate in businesses that monitor productivity remotely.

    https://www.securitymagazine.com/articles/96524-remote-productivity-surveillance-could-increase-staff-turnover

  • 0 Votes
    1 Posts
    47 Views
    CerberusC

    A new survey from Pulse and Hitachi ID reveals that nearly half of all enterprise team members have been approached by cybercriminals to assist a ransomware attack.

    https://www.securitymagazine.com/articles/96523-nearly-half-of-employees-have-been-asked-to-aid-ransomware-attacks

  • 0 Votes
    1 Posts
    31 Views
    CerberusC

    https://www.securitymagazine.com/articles/96522-inclusivity-the-true-pillar-of-biometric-registries

  • 0 Votes
    1 Posts
    47 Views
    CerberusC

    The good news is that work and life, whatever those terms mean to you, can coexist. Ingenuity, adaptive thinking and a willingness to embrace change are paramount in achieving this. Security leaders, at all levels, are responsible for setting precedents, norms and boundaries so their teams have quality time that can help to decrease the risk of burnout and promote strong norms for well-being.

    https://www.securitymagazine.com/articles/96521-can-protective-security-tactics-help-suppress-burnout

  • Security career exit strategies

    1
    0 Votes
    1 Posts
    47 Views
    CerberusC

    An exit strategy is not necessarily top of mind if you are enjoying a successful security career. How do you start planning your exit strategy when you are no longer seeking professional advancement?

    https://www.securitymagazine.com/articles/96520-security-career-exit-strategies

  • It’s all about the metrics

    1
    0 Votes
    1 Posts
    40 Views
    CerberusC

    One of the insight’s that this year’s security leaders shared with us was which metrics their security programs and the C-suite find most valuable — and we found some overarching trends in this area.

    https://www.securitymagazine.com/articles/96519-its-all-about-the-metrics

  • Instituting transparency in cybersecurity

    1
    0 Votes
    1 Posts
    59 Views
    CerberusC

    Foregrounding transparency can go a long way in securing your organization’s technology and workforce, according to four cybersecurity experts from Intel. Suzy Greenberg, Vice President of Communications and Incident Response; Maggie Jauregui, Offensive Security Researcher; Katie Noble, Director of Intel’s Product Security Incident Response Team (PSIRT) and Bug Bounty; and Amit Elazari, Director of Global Cybersecurity Policy discussed transparency in bug bounty and vulnerability disclosure programs, as well as gender parity in cybersecurity.

    https://www.securitymagazine.com/articles/96518-instituting-transparency-in-cybersecurity

  • 0 Votes
    1 Posts
    49 Views
    CerberusC

    Cornell researchers and FreedomPay have partnered to release the “Check Please! How Restaurant, Retail and Hospitality Businesses are Managing Cybersecurity Risks” study, which measures enterprise leaders’ perspectives on cybersecurity in the retail and hospitality sector.

    https://www.securitymagazine.com/articles/96515-one-third-of-retail-and-hospitality-organizations-have-experienced-a-data-breach

  • 0 Votes
    1 Posts
    49 Views
    CerberusC

    The Pentagon is set to launch a new office dedicated to expediting the adoption of a new zero trust cybersecurity model.

    https://www.securitymagazine.com/articles/96504-pentagon-to-launch-zero-trust-cyber-office-in-december

  • The three C's of supply chain risk

    1
    0 Votes
    1 Posts
    40 Views
    CerberusC

    The British Standards Institute (BSI) has released the annual Supply Chain Risk Insights report, which analyzes BSI data from the organization’s web-based intelligence system, Connect Screen.

    https://www.securitymagazine.com/articles/96514-the-three-cs-of-supply-chain-risk

  • 0 Votes
    1 Posts
    42 Views
    CerberusC

    The Indianapolis Symphony Orchestra (ISO) secures its historic concert hall with an access control and weapons detection system from STANLEY Security and Evolv, aiming to reduce security wait times and contact points for patrons.

    https://www.securitymagazine.com/articles/96513-indianapolis-symphony-orchestra-adds-contactless-access-control-system

  • 0 Votes
    1 Posts
    43 Views
    CerberusC

    Reducing our threat surface by limiting what any one person can access and improving organizational efficiency processes can go a long way in mitigating damage from the vast majority of attacks  — no matter if they come from inside or outside your organization.

    https://www.securitymagazine.com/articles/96516-3-tips-for-stopping-the-next-insider-attack

  • 0 Votes
    1 Posts
    55 Views
    CerberusC

    Government agencies can look to these private sector lessons while adopting zero trust methods in their organizations.

    https://www.securitymagazine.com/articles/96511-nist-and-zero-trust-what-federal-agencies-can-learn-from-the-private-sector

  • 0 Votes
    1 Posts
    50 Views
    CerberusC

    Financial institutions must protect themselves from salami attacks, which consist of a sequence of small, fraudulent transactions that can easily bypass detection but, combined, can result in considerable losses.

    https://www.securitymagazine.com/articles/96510-salami-attacks-small-deposits-resulting-in-significant-losses