For years there has been a persistent and spirited debate regarding the effectiveness of information security awareness programs and whether or not they should be utilized within the enterprise.
Keeping employees committed to information security is tough. The fundamental problem is that the better our security, the less evidence we have to reinforce it. As weeks and months go by with no ...
This article originally appeared in the March 2022 issue of Security Business magazine. When sharing, don’t forget to mention Security Business magazine on LinkedIn and @SecBusinessMag on Twitter.
A New Zealand consultancy called IsecT (standing for “security in IT”) runs a valuable Web site called NoticeBored that is anything but boring. IsecT CEO Gary Hinson commented wryly to me when he fact ...
Roy Zur is the founder and CEO of ThriveDX Enterprise: a leading end-to-end human factor cybersecurity solutions provider. I believe the key to reducing these threats is improving security awareness ...
Prefer Newsweek on Google to see more of our trusted coverage when you search. Data security is one of those issues that "takes a village" to address—and HR professionals are part of that village. HR ...
As the complexity and volume of vulnerabilities continue to increase, it’s encouraging to see that software developers are starting to understand the vital role they can play in upholding ...
Effective security awareness training ensures that your organisation’s employees know how to recognise and halt phishing attacks. Especially when combined with realistic simulations, micro-learning is ...
During the 2016 National Cyber Security Awareness Month in October, Frederick Scholl wrote an intriguing article for CSO Magazine entitled, “Time to kill security awareness training.” Many people ...
Imagine this: As part of an exercise to teach security awareness, employees enter a room. An actual, physical operational security "escape room," which at first looks like a regular office room. But ...
STOP. THINK. CONNECT. provides governments and organizations an existing campaign infrastructure -- as well as an international community of expertise and support.” — Peter Cassidy, CEO, STOP. THINK.
In modern physical security operations, IP-based devices have become the norm, effectively replacing analog systems of yesteryear. These digital systems and devices are generally regarded as superior ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results