Ava Turner Leone | Women in Security 2024

Ava Turner Leone | Women in Security 2024

Thriving in security When Ava Turner Leone first entered the workforce as an officer manager for an import customs brokerage firm, she couldn’t have imagined where her career would take her over the next 26 years. “Early on my career really was happenstance, it was completely kind of unplanned in terms of what direction that I was going, I didn’t know what I wanted to do or where I was headed,” Turner Leone says. Her…

Read More

Understand candidate screening data sources

Understand candidate screening data sources

Recent high-profile events in the United Kingdom have brought vividly to life the critical importance of organizations thoroughly checking candidate credentials before making a hire. They range from the abduction, rape and murder of Sarah Everard by an off-duty Metropolitan Police officer to the disturbing vetting scandal which saw an investigative reporter managing to infiltrate the U.K. prison service. What’s really frightening is that these incidents are likely to be just the tip of a…

Read More

Challenges and opportunities that AI presents CISOs

Challenges and opportunities that AI presents CISOs

The artificial intelligence (AI) landscape is constantly shifting. To maintain pace with these evolving technologies, CISOs must prepare for additional complexity in their security strategies.  While AI presents a challenge for CISOs, it also offers an opportunity. Here, we talk with Jadee Hanson, Chief Information Security Officer at Vanta to discuss the risks and benefits of AI.  Security magazine: Tell us about your title and background. Hanson: I serve as Chief Information Security Officer at…

Read More

Unveiling common ransomware attack methods to secure your organization

Unveiling common ransomware attack methods to secure your organization

With ransomware payments hitting a record $1.1 billion last year, it’s no wonder why it’s top of mind for most business leaders. Instead of wondering whether or not they’ll be hit with a ransomware attack, leaders need to be building a strategy for what to do when an attack is attempted on their business. The question isn’t “Will I get hit with ransomware?” it is “What will I do when it happens?” For years, the…

Read More

The power of partnerships

The power of partnerships

Throughout the day to day operations of a business or organization, it can be easy for different departments to work independently; however, when it comes to developing an effective security strategy, working cooperatively is indispensable. Whether it is collaborating with other departments or with outside organizations, building and maintaining partnerships is mission critical. “It’s impossible to do everything yourself,” says Jay Gruber, Associate Vice-President for Public Safety and Chief Public Safety Officer at Georgetown University….

Read More

Real-time data and AI are the new weapons against climate disasters

Real-time data and AI are the new weapons against climate disasters

When disasters strike, cities face immense coordination challenges. Traditional infrastructure and siloed operations often prove inadequate amid catastrophes like hurricanes, wildfires and flooding. As climate change intensifies extreme weather, the need for intelligent emergency systems becomes even more critical. Many cities still rely on outdated, disparate systems for monitoring, managing and responding to these incidents and events. Collaboration and information sharing is critical to ensure timely and efficient risk mitigation, response and recovery. Traditional standalone…

Read More

Use reliable intel to make informed decisions in a crisis

Use reliable intel to make informed decisions in a crisis

With the rise of geopolitical threats in recent years, organizations are finding the major impact that misinformation has had on making critical decisions in a time of crisis. International SOS has seen businesses of all sizes struggle with analyzing the slew of information that is available 24/7 during a time of a crisis, and using trusted sources to inform decisions in a timely manner, particularly for the health and security of employees and ensuring business…

Read More

The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble

The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble

In today’s ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to their networks are at their highest. Organizations are playing a high-stakes game with their networks, and the consequences of an attack could result in big financial losses, falls in customer trust, and damaged reputations if network infrastructure risk assessments…

Read More

Key elements of a comprehensive K-12 security plan

Key elements of a comprehensive K-12 security plan

Key elements of a comprehensive K-12 security plan | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The transformative impact of cryptocurrency on digital fraud investigations

The transformative impact of cryptocurrency on digital fraud investigations

The transformative impact of cryptocurrency on digital fraud investigations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3 4 8