Author Archives: Subscribe to Security Magazine's RSS Feed

Rand Report Recommends Strengthening Non-Law Enforcement Terrorism Prevention Programs

National capabilities for terrorism prevention — options other than traditional law-enforcement action to respond to the risk of individual radicalization to violence — are relatively limited, with most relying on local or non-government efforts and only a subset receiving federal support, according to a report from the Homeland Security Operational Analysis Center (HSOAC).

Protecting the LGBTQ Mobile Workforce

With the rapid growth of business travelers, especially millennial business travelers, companies often find it difficult to manage travel safety, health and security of their employees. This rapid growth also brings changes to the diverse composition of a mobile workforce and the risks associated with it. As the modern workforce continues to grow, there is no one-size-fits all approach to answering questions surrounding workplace law and lesbian, gay, bisexual, transgender and queer or questioning (LGBTQ) employees.

How Does the NIST Small Business Security Act Affect Your SMB?

2018 brought a lot of change to small business. In the wake of many new cybersecurity threats and breaches, the National Institute of Standards and Technology (NIST) Small Business Cybersecurity Act was passed into law in August 2018, and it requires NIST to provide cybersecurity resources to small and medium-sized businesses (SMBs) to help protect them against future problems.

Moving to a State of Resiliency: Why War Games Are the Key

You can’t simply learn resiliency; there isn’t a book or set of checkmarks you can apply to a list that means you are resilient. Instead, it’s real-world training like War Gaming that delivers the closest “I’ve been there” experience and creates the muscle memory needed to respond effectively when an incident – and all the fear, confusion and paralysis it can bring – occurs.

Compliance and Congress – How to Build an Effective Cyber Strategy

The growing threat of cyberattacks is a huge cause for concern. According to some of the country’s foremost intelligence experts, the U.S. may encounter a massive cyberattack on the horizon. An attack of this scale is predicted to cause damage comparable to a Category 5 hurricane, where everything from vehicles to pacemakers could be compromised. The country needs to be ready – and not just the public sector. Private businesses, regardless of size, would be taking an extreme risk if the necessary precautions are not put into place.

8 Vulnerabilities Penetration Testers Recommend You Address in 2019

A focus on the basic elementary principles of cybersecurity can go a long way in protecting your company from most attacks. Penetration testers are the frontline witnesses on cyber threats. They continue to see the same weaknesses and vulnerabilities within the enterprises they examine. Below, is a list of recommendations for you to be aware of in the year ahead.

500 Million Personal Records were Stolen in 2018

According to an annual report by the Identity Theft Resource Center, the number of U.S. data breaches tracked in 2018 decreased from last year’s all-time high of 1,632 breaches by 23 percent (or 1,244 breaches), but the reported number of consumer records exposed containing sensitive personally identifiable information jumped 126 percent from the 197,612,748 records exposed in 2017 to 446,515,334 records this past year.

Survey: IT Professionals Wish CEOs Knew More About InfoSec Efforts

According to a survey of 500 IT professionals (conducted by cloud and data center solutions provider INAP), 57 percent feel they’re only contacted when something goes wrong, and 27 percent feel strongly that “senior management has clearly communicated a desire to see the IT team more aligned with the goals of individual business units.”

The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

During the past decade, many corporate security divisions have made tremendous strides to evolve as a key component of their company's organizational strategy and growth. Whether a company's security program is in-house, outsourced or a hybrid of both, the leading global security executives and decision-makers are acutely aware of how to effectively leverage the resource capabilities of intelligence professionals within their organization.

Four Keys to Securing K-12 Campus Entries

The challenges of keeping inappropriate people out of a K-12 school have led many campus administrators to rethink how they control building entries. Unwanted visitors ranging from a non-custodial parent to an active shooter have too often entered a school through an easily accessible door. However, there are steps security experts agree can prevent – or at least delay – entry, making both students and teachers safer. 

Simplify Connected Campus Security

Colleges and Universities take matters of campus security very seriously. Every campus has a significant number of blue light/emergency phones located around the school property. Some of these phone locations also include security cameras that allow the caller to be seen by someone at the response center. As new technology becomes available and security gets more scrutiny, many schools are updating their systems. This can include the installation of VoIP security phones as well as IP cameras.

How to Choose a Trusted Vendor

Small and mid-sized businesses (SMBs) face unique challenges when choosing a security solution. While large businesses enjoy entire departments devoted to addressing the many facets of security – video surveillance cameras, video management, access control, network infrastructure – SMBs have limited resources to help them select and maintain a security solution.

Data Centers: Protecting the First Line of Defense

There are approximately three million data centers scattered across the United States. These facilities house organizations’ networked computer servers that collect, store, process and provide access to large amounts of data for millions of users each day. Today, these server farms have become critical to the essential functioning of government entities, financial institutions, large enterprises, social network organizations and smart cities.

Cybersecurity Education Goes Broad

When Kathleen Hyde talks about cybersecurity leadership, she talks about breadth. “Training is going to teach you the technical skills you need, but employers also want to see somebody who has problem-solving skills, who has good communication skills,” says Hyde, who chairs Cybersecurity Programs at Champlain College Online.