article thumbnail

IntelligentSIA: The Top 10 Events, Programs and Opportunities for Members in February 2024

Security Industry Association

Here are the top things you need to know about our latest activities and resources, upcoming events and opportunities and more. President Biden recently signed into law the National Defense Authorization Act (NDAA) for fiscal year 2024. Department of State activities, the intelligence community and other defense activities.

article thumbnail

Navigating the Security Landscape: A Quick Guide to the Common Vulnerabilities and Exposures Program for Young Professionals

Security Industry Association

Industry standards compliance: Many security standards and regulations require organizations to manage and address vulnerabilities actively. As more security companies join as CVE numbering authorities (CNAs), understanding the importance of CVE will support your career growth as a young professional in the security industry.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

World Backup Day: Four Data Protection Best Practices to Know

Pure Storage

World Backup Day: Four Data Protection Best Practices to Know by Pure Storage Blog This article originally appeared on SolutionsReview.com. It has been republished with permission from the author. But how do you achieve it?

Backup 96
article thumbnail

How Mass Gun Violence Trends Should Inform Physical Security Planning

Security Industry Association

In this article, we examine national gun violence data regarding shooter event frequency, locations and weapons used and review the insights. According to the Federal Bureau of Investigation , 2022 was the second-highest year (after 2021) for active shooter events of the last five years, and the year with the most casualties.

article thumbnail

A beginner’s guide to implementing zero-trust architecture

Online Computers

This article offers a layman’s overview of zero-trust architecture so you can better understand and appreciate how important it is to your business’s cybersecurity measures. You never assume that any user or device is trustworthy, and all access requests are subjected to verification and authorization. What is zero-trust architecture?

article thumbnail

AI Readiness Is Not an Option

Pure Storage

AI Readiness Is Not an Option by Pure Storage Blog This article on AI readiness initially appeared on Kirk Borne’s LinkedIn. The blog has been republished with the author’s credit and consent. For a short introduction to generative AI, see my article “ Generative AI – Chapter 1, Page 1 ”.

article thumbnail

What is Zero Trust Architecture?

Pure Storage

In this article, we’ll discuss what ZTA is, why it’s augmenting traditional perimeter network security, and how to implement it. Every single new connection attempt should be treated with rigorous authentication and authorization. Continuous monitoring: Zero trust continuously monitors network activity and user behavior in real-time.