article thumbnail

The chief information security officer (CISO) role explained

BMC

Information security is a top concern for business organizations, as research finds that cyber-attacks are launched 2,244 times a day—that’s every 39 seconds. The role of Chief Information Security Officer (CISO) is gaining popularity to protect against information security risks. The average cost of a data breach is $3.9

article thumbnail

Uber Security Breach - News Alert

Scott R. Davis

September 16, 2022 – The Cyber Security Association of Pennsylvania and it's President Scott R. Uber has announced that they are investigating a wide-reaching security breach that was started when an employee answered a text message from a person impersonating IT support with their user credentials. What do you do?

Alert 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Industry Association Announces 2025 SIA Women in Security Forum Power 100 Honorees

Security Industry Association

Now in its fourth year, the SIA WISF Power 100 program showcases 100 women who are role models, leaders, innovators and influencers in the global security industry. The Security Industry Association (SIA) has announced the 2025 honorees for the SIA Women in Security Forum (WISF) Power 100. SILVER SPRING, Md.

Security 105
article thumbnail

Transforming Physical Security: How AI is Changing the GSOC

Security Industry Association

Ryan Schonfeld is the co-founder and CEO of HiveWatch, a security technology company reimagining how companies keep their people and assets safe. Security teams face chronic understaffing, with turnover rates ranging from 100% to 300% annually. A perfect storm of operational inefficiencies that puts both security and budgets at risk.

article thumbnail

Security Industry Association Welcomes New Leadership of SIA Perimeter Security Subcommittee

Security Industry Association

The Security Industry Association (SIA) has named two industry leaders Christa Decker, vice president of the Protective Design Group at Whitman, Requardt & Associates (WRA), and Amy Dunton, business development specialist at Ameristar to serve as co-chairs of the SIA Perimeter Security Subcommittee. SILVER SPRING, Md.

article thumbnail

Active Shooter Lessons Learned: Key Strategies for Response

BryghtPath

This in-depth look at active shooter lessons learned examines crucial takeaways from past tragedies to bolster security preparedness & response efficacy. The post Active Shooter Lessons Learned: Key Strategies for Response appeared first on Bryghtpath.

article thumbnail

LDAP vs. Active Directory: What’s the Difference?

Pure Storage

LDAP vs. Active Directory: What’s the Difference? Both Active Directory and LDAP play a role in allowing users to seamlessly access printers, servers, storage, applications, and other environments, resources, and devices. Active Directory (AD) is Microsoft’s database of policies, users, and devices authorized to access the network.