Summer travel plans? Don’t get scammed while you’re away

Summer travel plans? Don’t get scammed while you’re away

Your itinerary is set.  Your luggage is packed.  You’ve even scheduled the Uber pickup for the morning trip to the airport. It seems as if nothing now stands in the way between you and clicking that glorious out-of-office button. However, if you work in IT or security, your pre-summer vacation checklist must go beyond the items you’ll pack inside a suitcase. How will you maintain the organization’s cyber security posture when you’re away from the…

Read More

The journey toward secure software development lifecycles

The journey toward secure software development lifecycles

The digital transformation race is on, and companies are churning out applications at an ever-increasing pace. Unfortunately, this speed often comes at the cost of security. A recent study revealed a shocking statistic: 92% of companies experienced a breach due to vulnerabilities in their own internally developed applications. A different approach is clearly needed. The solution might be found in the security philosophy known as “shift-left,” which essentially promotes the integration of security practices earlier…

Read More

Locking out ransomware: A new way to look at security strategy

Locking out ransomware: A new way to look at security strategy

Ransomware attacks are accelerating at a record pace, becoming dramatically more frequent and more sophisticated. In fact, nearly 60% of companies experienced ransomware events in the last year, forcing desperate businesses to cough up a staggering $1 billion in ransom payments. That’s up from the $220 million that was paid to bad actors in 2019. Change Healthcare is just one recent example. The company was hit with one of the largest ransomware attacks within healthcare,…

Read More

Absolutely the most important list you will ever read!

Absolutely the most important list you will ever read!

Say this, not that. Read that, not this. Do this, not that. You too can become a great leader if you simply follow the exhortations of leadership lists that can be found all over the Internet.  Which phrases should good leaders never say? Dozens of articles purport to document the five, eight, 12, or 17 no-nos. Conversely, great leaders may exhibit their very greatness by injecting key incantations in their communications with staff. The Internet is rife…

Read More

Weapons detection in healthcare: A snapshot and guide

Weapons detection in healthcare: A snapshot and guide

A woman carrying a Louis Vuitton purse and Macy’s shopping bag hurries through the front doors of a hospital in Washington, DC, and immediately eyes a recently installed weapons detection system (WDS) portal. Perhaps experienced with such fixtures at airports, she steps aside to allow others passage, then begins the ritual unburdening of bags, phones, keys, rings, pocket change, and other items that could possibly trigger an alert. A hospital security officer quickly intervenes and…

Read More

Top 5 things CISOs should know to protect their business

Top 5 things CISOs should know to protect their business

For businesses of every size and level of maturity, a strong cybersecurity strategy is crucial to protecting sensitive data and other digital assets. The right security measures are key to building resilience against increasingly sophisticated cyber threats in an interconnected world but must also be optimized for a company’s business. There is no one best practice that is applicable to every company. The focus on cybersecurity will continue to sharpen, and companies will rely more…

Read More

To pay or not to pay? Negotiating in the age of ransomware

To pay or not to pay? Negotiating in the age of ransomware

In 2023, more than 2,200 networks across United States hospitals, schools and government organizations, as well as thousands of private businesses, were breached by cybercriminals. With another record-breaking year for ransomware and data extortion in the rearview mirror, organizations of all sizes are preparing for when they’ll need to make their big payout in 2024. But what if paying the ransom wasn’t the only way out?  There’s often room to negotiate with threat actors or,…

Read More

Unveiling common ransomware attack methods to secure your organization

Unveiling common ransomware attack methods to secure your organization

With ransomware payments hitting a record $1.1 billion last year, it’s no wonder why it’s top of mind for most business leaders. Instead of wondering whether or not they’ll be hit with a ransomware attack, leaders need to be building a strategy for what to do when an attack is attempted on their business. The question isn’t “Will I get hit with ransomware?” it is “What will I do when it happens?” For years, the…

Read More

Best practices for securing critical and public infrastructure

Best practices for securing critical and public infrastructure

The United States government defines the “critical infrastructure” as 16 specific sectors considered so vital to the U.S. that their incapacitation or destruction would have a debilitating effect on security, national economic security and national public health and/or safety. The “public infrastructure” is a subset of the critical infrastructure and includes roads, bridges, public transportation and airports, drinking water and wastewater treatment systems, solid waste services and facilities, and other important utilities essential to communities…

Read More

Navigate the new European AI Act and possible global standardization

Navigate the new European AI Act and possible global standardization

No doubt, the European Union’s (EU) recently approved, comprehensive regulation act on artificial intelligence (AI) is an important milestone in the global effort to establish responsible AI governance. This landmark legislation establishes a robust legal structure, setting stringent standards for AI development and usage within the EU, with the aim of nurturing a climate where businesses and investors can innovate with confidence, knowing their AI systems must adhere to principles of safety, transparency, equity and…

Read More
1 2 3 4 6