article thumbnail

Event Spotlight: DRI’s One-Day Conference at NYU

DRI Drive

By Diego Robledo, CGA Graduate Vice President of ESG, Santander Corporate and Investment Banking The swift advancement of emerging technologies is paralleled by a proportional rise in their vulnerabilities. Recognizing the pressing nature […] The post Event Spotlight: DRI’s One-Day Conference at NYU appeared first on DRI Drive.

article thumbnail

The top five security vulnerabilities of SMBs

Acronis

To protect yourself against these attacks and continue as unscathed as possible in event of one, it’s important to know the most common security vulnerabilities of SMBs and how to avoid them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. So what can we learn from this event?

article thumbnail

Event Report: Perimeter PREVENT – the Premier Perimeter Security Event

Security Industry Association

1, 2023, the Security Industry Association (SIA) hosted Perimeter PREVENT , a free daylong symposium examining critical issues related to perimeter defense for physical environments, including government and commercial facilities, critical infrastructure, events and more. Here are some key takeaways and discussion highlights from the event.

article thumbnail

Navigating the Security Landscape: A Quick Guide to the Common Vulnerabilities and Exposures Program for Young Professionals

Security Industry Association

One impactful group in this ongoing battle is the Common Vulnerabilities and Exposures Program (CVE). Spearheaded by the MITRE Corporation, CVE is a crucial framework for identifying and managing vulnerabilities across various systems. Risk mitigation: Identifying vulnerabilities is the first step towards mitigating risks.

article thumbnail

Managing Extreme Heat Events

everbridge

A Q&A with Brian Toolan , Everbridge VP Global Public Safety Talk about the trend in heat events that are impacting state and local governments. Second, emergency managers are opening cooling shelters, trying to get the homeless and vulnerable populations into areas where they’re not going to suffer from the extreme heat.

article thumbnail

Ensuring Operational Resilience Amidst Geopolitical Events

Fusion Risk Management

In an increasingly interconnected world, organizations with a global presence face a unique set of challenges when it comes to maintaining resilience during geopolitical events. Crisis and Incident Response Geopolitical events often necessitate the activation of emergency response and crisis response plans.