New products of the week 8.1.16

— Privileged Access Management empowers professionals to control, monitor and manage privileged users’ access to critical systems. PAM 16.1 includes new features like 3D Touch and Touch ID support for iOS. Full Story

Five Lessons for Good Airport Security Practices

— Many people love living in the Tampa area for a lot of reasons, among them of course is having access to regular use one of the most popular airports in the USA - Tampa International Airport (TIA). Unfortunately for the people that run TIA, they experienced an IT security breach as reported in May. However, unlike a lot of the other organizations, because it is an international airport, the profile of the breach was far higher because of its security status. Full Story

Credit card security breached at local Cicis restaurants

— More than 130 Cicis Pizza locations, including Waco’s at 1609 N. Valley Mills Drive, Bellmead’s at 910 North Loop 340, Suite 4, and Killeen’s at South Fort Hood Street, have suffered a security breach that could compromise information on payment cards used at the stores, the company announced Monday. Full Story

Is Tech Support getting worse on purpose?

— There's an old saying in the tech world, "technology works great, except when it doesn't." We've all been there, right? Check out this podcast on the battle between technology, users and technical support. Full Story

The three major security implications of the IoT

— Infosec pros have spent the past decade fighting a rising tide of both more users and more devices connecting to enterprise resources while at the same time trying to decrease the attack surface — that is, trying to shut down as many points of access as possible. Much of this is usually attempted by first inventorying connections, consolidating network systems and targeted servers, building portals to cut down on remote access, and advanced correlation of security events by a central security element. Full Story

Millennials Bring New Workplace Cybersecurity Challenges

— As Baby Boomers increasingly exit the workforce and Millennials move in to take their places, HR professionals must assess and mitigate the cybersecurity risks posed by new workers who grew up in the digital age, according to a new study by Software Advice, headquartered in Austin, Texas. Full Story

The evolving face of cybercrime

— The evolution of cybercrime is multi-faceted – from social engineering integrating targeted spam and phishing attacks, to insider threats and vendor vulnerability. It’s becoming an intertwined network that’s increasingly difficult for CIOs, CISOs, and IT managers in organisations of all sizes to appraise and manage. Full Story

Are You and Your CIO in Sync?

— Keeping internal tech teams up to date on legal and compliance trends is a never-ending task for many corporate legal departments. But it remains an important one, as CIOs and CISOs developing technology plans for a company need to account for these requirements and more. Full Story

What security pros can learn from the networking team

— It's a familiar scenario: your security team wants—needs—to lock down part of your enterprise's network. And yet the network team resists you at every turn. Don't they understand that security is paramount? Do they want to get hacked? Full Story

IoT security: Isolating threats with access management

— The mainstream adoption of the Internet of Things (IoT) is on track to develop exponentially. Across all sectors, businesses are set to embrace IoT through connected devices of all calibres from remote working using personal devices to industrial controls streamlining manufacturing, in the strive to improve efficiency, quality and customer experience. However, while there are likely many benefits of IoT adoption, it will undoubtedly bring issues of security to the forefront. Full Story

Elizabeth Hulsey | Public Relations Specialist Bomgar Corporation