The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
As private enterprises and governments around the world look into vaccine passports for the future, security leaders must ensure that they are administered in the right way, so that we aren't taking away one problem and creating another.
Secure and reliable utility operations are vital to national security across the globe. The frequency of attacks on critical infrastructure is rapidly rising, not just in the U.S., but across the globe. Here’s what security leaders can do to protect utilities.
Cybersecurity professionals are far more likely to hold vendor-specific certificates than certifications from a vendor-neutral association or standards-based organization, according to the (ISC)2 Cybersecurity Career Pursuers Study. But when asked which qualifications they would recommend to cybersecurity newcomers, professionals tend to prioritize vendor-neutral credentials.
With more than 4,000 ransomware attacks occurring daily since the start of 2016 according to The U.S. Department of Justice, every company of every size, every network stack and every infrastructure deployment is a potential target.
Fact is, security in the cloud needs improvement. The problem is that cloud service providers treat cloud security as a shared responsibility with their customers. And while cloud purveyors typically hold up their end of the bargain, many customers do not. Human error among cloud customers is rampant.
As travel continues to make its comeback, businesses need to be taking a renewed look at their duty of care policies to provide their road warriors with the adequate — and expected — level of safety and security.
The security and safety hazards for hospitality workers are so diverse, and physical security leaders within the organization need to protect frontline staff with a proactive, comprehensive approach to their well-being.
The ethical issues that exist around the wake of discovered security vulnerabilities are vast and murky. Far too often, the conversation about how and when to disclose security weaknesses shifts from a dialogue to a one-way monologue. What's a security leader to do?
5G, as often happens with new technologies, will likely introduce both digital and business revolution along with a plethora of new threat vectors. In particular with the exposure of new connected devices, industries and services, and sensitive assets will undoubtedly be affected by new cyber threat agents; the EU, however, is ready to mitigate these potential threats.
The fragility of supply chain security in many ways, rests on the shipping container. The incident in the Suez Canal has shed light on vulnerabilities and complexities within the supply chain.