Close
News
Security Magazine
Mon, 06 Jul 2020 00:00:00 -0400

The Chicago Department of Public Health has issued an Emergency Travel Order that directs travelers returning to Chicago from states experiencing COVID-19 hot spots to quarantine for 14 days.

Mon, 06 Jul 2020 00:00:00 -0400

Los Angeles School Police Department Deputy Chief Leslie Ramirez has been named interim chief of the department, following Chief Todd Chamberlain’s resignation.

Mon, 06 Jul 2020 00:00:00 -0400

To help meet the need for specialized engineers who can design and defend secure systems, Duke University is launching a new Cybersecurity Master of Engineering degree program.

Mon, 06 Jul 2020 00:00:00 -0400
I was very pleased to learn the ASIS Global Board of Directors unanimously approved the “Thin Purple Line” initiative at their June 22, 2020 board meeting.
Mon, 06 Jul 2020 00:00:00 -0400

Passengers who fly Qatar Airlines are now required to wear a face shield, in addition to a face mask or covering, throughout their flight, and will be given a complimentary protective kit onboard.

Mon, 06 Jul 2020 00:00:00 -0400

How has a memorial plaza, a large metropolitan city and a sports stadium added business value with megapixel cameras?

Mon, 06 Jul 2020 00:00:00 -0400

The threat of radio frequency espionage has never been greater. Billions of devices running on networks across the wireless spectrum pose severe dangers to enterprise and national security. What are some of the hidden dangers of radio frequency?

Fri, 03 Jul 2020 00:00:00 -0400

We spoke with Felix Nater, security management consultant who helps employers implement and manage workplace security strategy and policy, on how COVID-19 will leave behind a complicated form of grief that could linger potentially for many years after the immediate crisis has abated.

Thu, 02 Jul 2020 12:35:00 -0400
The nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected – particularly when the malware does not disrupt the device’s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers.
Thu, 02 Jul 2020 12:32:00 -0400
My favorite definition of the (public) cloud is “It’s someone else’s computer.” That is really what any external cloud service is. And if your services, data and other assets are located on someone else’s equipment, you are at their mercy on whether you can access those assets and data at any time. It isn’t up to you. It’s solely determined by them, and any service level agreement you agreed to. And you can lose everything stored there permanently. You should have multiple backups of your data no matter where it is stored, especially including if it is stored using a cloud service.
Thu, 02 Jul 2020 12:30:00 -0400
Obstacles including budget concerns, time constraints, stubborn company culture, or a lack of cybersecurity best practices can seem overwhelming, especially to a smaller organization with limited resources. Fortunately, there are reasonable solutions to each of these roadblocks that can help all organizations be more secure.
Thu, 02 Jul 2020 00:00:00 -0400
Since joining the University of Utah as the inaugural Chief Safety Officer (CSO) in February 2020, Marlon Lynch has reorganized the structure of the Department of Public Safety. The changes, which include the addition of new leadership throughout the organization and the elevation and growth of existing divisions, increases capacity, improves accountability and better meets the needs of the U community.
Thu, 02 Jul 2020 00:00:00 -0400
The Lookout Threat Intelligence team has discovered four Android surveillanceware tools, which they named SilkBean, DoubleAgent, CarbonSteal, and GoldenEagle. These four interconnected malware tools are elements of much larger mAPT (mobile advanced persistent threat) campaigns originating in China, and primarily targeting the Uyghur ethnic minority, says the team.
Thu, 02 Jul 2020 00:00:00 -0400

A survey by the Centers for Disease Control and Prevention found that 54% of people infected with coronavirus were unable to pinpoint who may have infected them.

Thu, 02 Jul 2020 00:00:00 -0400
IBM Security announced the results of a global report examining businesses' effectiveness in preparing for and responding to cyberattacks.
Thu, 02 Jul 2020 00:00:00 -0400
In the first quarter of the year, DDoS attacks rose more than 278 percent compared to Q1 2019 and more than 542 percent compared to the last quarter, according to Nexusguard’s Q1 2020 Threat Report.
Thu, 02 Jul 2020 00:00:00 -0400
Yesterday (July 1, 2020) marked the official deadline to achieve compliance of the California Consumer Privacy Act (CCPA).
Thu, 02 Jul 2020 00:00:00 -0400

A new Trend Micro study reveals how remote workers address cybersecurity -- 72% say they are more conscious of their organization’s cybersecurity policies since lockdown began, but many are breaking the rules anyway due to limited understanding or resource constraints.

Wed, 01 Jul 2020 00:02:00 -0400

Meet 13 female executives who are succeeding in security leadership roles.

Wed, 01 Jul 2020 00:00:00 -0400

Identity and access management (IAM) protects the business while keeping employees securely connected, but were organizations prepared for their employees to work from anywhere? LastPass ran a study with IT decision makers, in partnership with IDG, to discover the impacts of remote work to IAM and found that IAM is critical to securing a remote workforce, but almost all organizations have had to adjust their IAM strategy to securely enable employees to work from anywhere.

Wed, 01 Jul 2020 00:00:00 -0400

The Federal Bureau of Investigation is warning the public about potential fraud schemes related to antibody tests for COVID-19.

Wed, 01 Jul 2020 00:00:00 -0400

(ISC)² announced that its 10th annual (ISC)² Security Congress will take place as a virtual conference, November 16-18.

Wed, 01 Jul 2020 00:00:00 -0400

U.S. Senators introduced the Lawful Access to Encrypted Data Act, a bill to bolster national security interests and better protect communities across the country by ending the use of “warrant-proof” encrypted technology by terrorists and other bad actors to conceal illicit behavior.

Wed, 01 Jul 2020 00:00:00 -0400
The Security Industry Association (SIA), through its Ethics in Security Technology Working Group, has developed the SIA Membership Code of Ethics, a set of nine ethics principles designed to promote the highest standards of conduct among its members.
Wed, 01 Jul 2020 00:00:00 -0400

The path to securing the remote workforce should be seamless and experienced as a hassle-free balance between safety and a quality user-experience. It is pivotal to implement appropriate security practices, as inadequate measures can lead to unmanaged risks and the endangerment of corporate systems, data and employees.

Wed, 01 Jul 2020 00:00:00 -0400

Sure, Greek mythology begins with Zeus, Poseidon and Hades divvying up the universe in a game of dice. But they never employed risk management as a methodology to take the future into their own hands. How can security professionals best develop a risk mindset based on probability and rigor rather than intuition and emotion?

Wed, 01 Jul 2020 00:00:00 -0400

Global lockdowns, travel restrictions, expansion of remote working arrangements and numerous cancellations of professional programs and events we are now experiencing will have a profound impact on the opportunity to develop your security career through networking.

Wed, 01 Jul 2020 00:00:00 -0400

Global technology association ISACA recently installed its 2020-2021 Board of Directors at its virtual Annual General Meeting, featuring a strong combination of executive expertise and association and chapter leadership experience.

Wed, 01 Jul 2020 00:00:00 -0400

In the midst of the current health crisis, healthcare organizations and workers worldwide have faced a number of challenges. Exposure to the disease, lack of critical medical devices and shortage of healthcare professionals are the top three challenges they face, according to research firm Verdict.