How do cybersecurity leaders view the current state of cyber tech in China? The eighth episode of The Cybersecurity and Geopolitical Podcast — China’s Role in Cybersecurity: Opportunity, Manufacturer or …
Technologies Pulsar

Facial recognition technology’s serious security problem
Facial recognition technology (FRT) is rapidly gaining traction globally – for all different use cases. Read More

7 essential capabilities to consider when evaluating ERP security, risk and compliance solutions
Here are seven questions to ask vendors to guide your organization’s evaluation of enterprise resource planning (ERP) application security, risk and compliance solutions. Here are seven questions to ask vendors …

Toward an enlightened micromanagement
There are strategies for avoiding the downsides of typical micromanagement, however, by following the path of enlightened micromanagement. Here are a few tips. There are strategies for avoiding the downsides …

IP cameras bolster Belgian retailer’s surveillance system
Safti, a Belgian home improvement retail organization, used to employ a legacy surveillance solution to secure their store. IP cameras from IDIS have improved their security posture, according to the …

Four steps to build and retain a solid cybersecurity team during a labor shortage
Here are four steps to consider when building or improving your existing culture and recruiting practices. Here are four steps to consider when building or improving your existing culture …

What’s next after Log4j?
It’s hard to know how many systems are already compromised by the log4j security vulnerability. It may take months or even years until we know if most critical systems were …

Mobile access control secures Finland’s Nokia Arena
Nokia Arena in Tampere, Finland, uses access management solutions like mobile keys and rapid emergency exit protocols from Abloy Oy. Nokia Arena in Tampere, Finland, uses access management solutions like …

Why so many cybersecurity attacks still start with an email
As attackers continue to advance and increase their sophistication levels, legacy email security technologies no longer provide sufficient protection for organizations. As attackers continue to advance and increase …

How cyber underwriters can better respond to the current cyber pandemic
With cybercrime on the rise, below are a few ways that underwriters can provide more comprehensive cyber insurance. With cybercrime on the rise, below are a few ways that underwriters …

Top 15 cybersecurity predictions for 2022
As you build your roadmap for the year ahead, security and risk experts offer 15 cybersecurity predictions for 2022. As you build your roadmap for the year ahead, security and …

Security magazine’s Top 10 web exclusives
The Security team compiled this year’s top web exclusive articles — all of which were contributed by security and risk experts The Security team compiled this year’s top web exclusive …