What are the nuclear security considerations that the extensive use of advanced digital systems and information-technology features bring with them? How do nuclear security regulations address risks ...
Forbes contributors publish independent expert analyses and insights. I write about contemporary cybersecurity and online privacy issues. Integrating computer vision technology is a big step forward ...
Identifying anomalies in the operations of computer systems that control critical safety and security functions calls for extensive expertise, and the actions required need to be tested, analysed and ...
A comprehensive cybersecurity strategy should include physical security. Adversaries don't need to worry about compromising a corporate device or breaching the network if they can just walk into the ...
“Growth creates complexity, which requires simplicity” – Mike Krzyzewski. There is a common misconception that the more security tools you have, the better your organisation’s security posture. It’s ...
Working in the cyber security industry has always been high-pressure but we have seen that pressure intensify. Advancing threats, expanded attack surfaces, rising workloads and a global skills ...