Retailers have recently experienced a significant increase in the theft of goods from their physical locations.
Seven Ways to Ensure Successful Cross-Team Security Initiatives
Many organizations have one or more strategic initiatives that involve a large amount of coordination and cooperation across functions and teams. In my experience, these cross-team initiatives are often the most challenging ones, while simultaneously being the most rewarding. There are a number of reasons why this is the case, though I’d like to take a look at a different angle in this piece.
How to Attract Hard-to-Find Cybersecurity Talent
It’s tempting to view cybersecurity through the lens that new and better technology will knock down threats and deliver all the protection an organization needs. While the right tools, applications and systems are essential, the problem for most organizations is managing a security framework.
Meshed Cybersecurity Platforms Enable Complex Business Environments
Cybercriminals are exploiting the confusion that results from organizations simply throwing money at their cybersecurity challenges
CISA Steps up Public and Private Sector Collaboration in 2021
We just concluded a very eventful year for the cybersecurity industry. Starting with an unprecedented wave of ransomware attacks on critical infrastructure targets, 2021 finished with the infamous Log4j vulnerabilities, which present a severe and ongoing threat to organizations and governments around the world.
The Second Building Block for the SOC of the Future: An Open Integration Framework
The SOC of the future must be data driven, so it’s essential that systems and tools can work together
The Need for Survivable, Trustworthy Secure Systems
5 Ways to Reduce the Risk of Ransomware to Your OT Network
In the last year and half, we’ve seen an unprecedented increase in ransomware attacks on Operational Technology (OT) networks. While this surge is generating a lot of press coverage, it was something that experts within our industry have been anticipating for a while.
Planning for the Future: What’s Ahead in 2022
Current security technology stacks are not keeping up with the increasing scale and sophistication of attacks
Upskilling Cyber Defenders Requires a Readiness Environment
The cybersecurity threat landscape never stands still. New threats and threat actors appear all the time. They are highly trained, well-funded, and leverage the newest tools to pursue some form of cybercrime — extortion, terrorism, data theft, the list goes on.