More than three-quarters of companies regularly take 10 common security steps to improve their overall defensive posture, including instrumenting their Secure Development Lifecycle (SDLC) and using ...
As I mentioned in my last article, security policies serve to protect (data, customers, employees, technological systems), define (the company’s stance on security), and minimize risk (internal and ...
As cloud computing has evolved and expanded, the cloud security industry has focused on a series of top issues, each one taking turns at the top of the priority pile. The risks of misconfigurations ...
Critical infrastructure organizations are undergoing dramatic changes in their technology and cybersecurity landscapes that make them both more efficient and more vulnerable. Power, oil and gas, ...
Editor's note: Industry Insights are sponsored blogs submitted by manufacturers and suppliers serving the fire service industry. Earlier this year, a fire department reached out to our team at ...
Jim Alkove is the Chief Trust Officer at Salesforce, where he's responsible for enterprise-wide information security and compliance. In my last post, I talked about nailing the basics as the best way ...
On average, homeowners can expect to purchase at least four security cameras for reasonable coverage. While most apartments ...
The concept that’s become known as Physical Security Information Management (PSIM, pronounced P-sim) was introduced to the physical security world in 2006. The idea is that all the stuff of security ...