Calls for greater collaboration as security industry faces ‘blended threat’

“The threat is blended so the teams need to work together,” said Ellie Hurst, Marcomm and Media Manager for Advent IM at IFSEC International. Hurst cited numerous attacks where hackers exploited vulnerabilities found in physical systems. Read why Ellie Hurst of Advent IM says that that should be a greater collaboration as security industry faces a […]

The Convergence of Physical Security and Cybersecurity

Read Ben DiPietro’s  article about why by convergence of cyber security and physical security is absolutely necessary for organisations on Wall Street Journal : Imad Mouline, chief technology officer at critical communications services provider Everbridge Inc., talks about the melding of physical security and cybersecurity and the importance to organizations of getting this process right. […]

7 elements of a successful security awareness program

Read Ira Winkler list seven key elements of a successful security awareness program on CIO : When I was asked to keynote a CSO event four years ago, I was pleasantly surprised to find that security culture was the top concern of the CSOs in attendance. Having performed many security assessments and penetration tests, I […]

Cyber Security ‘as Important As Physical Security’

A key figure in American business has urged all companies to take the cyber security threat more seriously after chastising his own accountant for paying a ransomware demand. Jorge Fernandez, VP global commerce for the Metro Atlanta Chamber, said it is time that firms took the same care in cyberspace as they do when installing physical […]

Study: Employers aware of cybersecurity threats but not proactive enough

A new study by CompTIA found that only 29% of businesses said they were proactive about fighting cyber attacks, with emphasis on detecting and responding to them, according to an email sent to HR Dive. The Evolution of Security Skills also found that another 34% combine a strong defense with some proactive measures. Read about […]

Managing Security Is More Realistic Than Solving It, Says ARM’s Chief Executive

Last year, ARM infused its hardware security technology called TrustZone into fraction-of-a-millimeter-sized chips to be used in connected bandages or package trackers. But on Tuesday, the chief executive of the chip designer underscored another vital form of security. Read why Simon Segars of ARM says that managing security is more practical than trying to solve it on […]

The fight to defend the Internet of Things

Read Raj Talluri list methods to fight the Internet of Thing security menace on Network World : The Internet has entered a new chapter called the Internet of Things (IoT). It follows the fixed-Internet era characterized by connected PCs and laptops through the 1990s, and builds on the mobile-Internet era spearheaded by the proliferation of smartphones […]

The 4 types of cybersecurity threats and a formula to fight them

Wells Fargo’s chief information security officer Rich Baich has to be very strategic about the way he spends his budget in order to protect the bank from the endless stream of cyberattacks launched at it every day. Read Rich Baich of Wells Fargo describe four types of cyber security threats and how companies could fight […]

In North America, 20% of All Data Breach Incidents Are in the F&B Industry

Trustwave released the 2017 Trustwave Global Security Report which reveals the top cybercrime, data breach and security threat trends from 2016. The report demonstrates both good and bad news in the world of cybersecurity as intrusion detection and breach containment times were relatively better, but other threats like malvertisements became cheaper and malicious spam saw […]

Hit by a data breach? 5 steps you must take

Whether it’s a ransomware attack or a cyber security incident, organizations have specific obligations to manage the incursion and file appropriate reports with the federal government. For example, the Office for Civil Rights of the Department of Health and Human Services recently outlined the basic steps for healthcare organizations to take in response to a […]