Archives

Addressing the Barriers to Closing the Cybersecurity Skills Gap

After the notorious SolarWinds cyberattack, cyber events have continued to illustrate the need for a highly trained and prepared cybersecurity workforce—and even motivated American adults to consider a career change to the field. According to the U.S. Bureau of Labor Statistics, employment in cybersecurity is expected to grow significantly faster than most occupations, increasing by […]

Faces of Security: Noureen Njoroge from Nike

Noureen Njoroge, Director of Global Cyber Threat Intelligence at Nike, has dedicated her life to solving problems, leading teams, and mentoring others, especially women entering the cybersecurity field. As a global keynote speaker and winner of several industry awards, Njoroge has vast knowledge of business management, threat mitigation, and data privacy. Before joining Nike, she […]

Texas Concert Safety Report Aims to Prevent Astroworld-Like Tragedy

The Texas Task Force on Concert Safety has released its final report, which includes recommendations and strategies to ensure the safety of concertgoers in the Lone Star State. Gov. Greg Abbott launched the task force in November 2021 in response to the tragedy at the Astroworld Festival in Houston that killed 10 concertgoers and injured over […]

Biden Admin Unveils Counter-UAS National Action Plan

The Biden administration has released what it called the “first whole-of-government plan” to address domestic threats posed by unmanned aircraft systems (UAS), commonly known as “drones.” According to a White House fact sheet, UAS have become a regular feature of American life over the last decade. They’re used for recreation, research, and commerce. But the […]

Back to Basics: Comparing One-Way and Two-Way Emergency Communication Devices

Back to Basics is an article series highlighting important, but possibly overlooked, information that security professionals should know. In April 2022, the Cybersecurity and Infrastructure Security Agency (CISA) is celebrating its first Emergency Communications Month. The agency aims to support the ability of emergency response providers nationwide to communicate with other security professionals and the […]

Managing Security in the Age of ‘The Big Quit’

COVID-19 has changed work more than any event in modern history. At the onset of 2020, unemployment was at an all-time high, as businesses were forced to trim their teams or, in more extreme cases, shutter entirely. Now, nearly 2 years later, we’re facing another form of unemployment, but this time, it’s employees in the […]

Report Ranks Top 10 Most Imitated Brands in Phishing Attacks

Social media network LinkedIn became, by far, the most impersonated brand in phishing attempts worldwide during the first quarter of 2022 (Q1’22), according to a new report. In a brand phishing attack, cybercriminals try to imitate the official website of a well-known brand by using a similar domain name or URL and webpage design to […]

Major Trends Impacting the Body Armor Market

The world is witnessing an unprecedented increase in cross-border conflicts and geopolitical tension—a recent example being the Russia-Ukraine crisis. Military-grade safety equipment such as body armor has become an essential tool for law-enforcement personnel and armed forces to ensure safety and survival during security operations. Designed as protective clothing to absorb or deflect physical attacks, […]

The Cybersecurity Threats Facing Smart Buildings

The threat of cybercrime impacts all businesses, no matter how big or small they are. The more advanced our operations become through modern software, the more open they are to outside attacks. But advancement is essential for progress, and even the buildings we do our work in are not as simple as they used to […]

Trust No One: Staying Secure with a Zero-Trust Security Model

It seems that Fox Mulder from the hit television show “The X-Files” had it right when he said, “Trust no one.” It’s a philosophy that is central to the zero-trust security model, an information technology approach that forces computer systems to always verify devices before connecting to them rather than automatically trusting them. Security professionals […]