Sentences with phrase «in the information security threat»

Not exact matches

«Verizon is committed to the highest standards of accountability and transparency, and we proactively work to ensure the safety and security of our users and networks in an evolving landscape of online threats,» said Chandra McMahon, Verizon's chief information security officer, in a statement.
Small business owners fingered social networks as biggest threat to information technology security in 2010, according to a new report.
FSTEC confirmed Markov's account, saying in a statement that Russian testing laboratories immediately inform foreign developers if they discover vulnerabilities, before submitting a report to a government «database of information security threats
Examples of these risks, uncertainties and other factors include, but are not limited to the impact of: adverse general economic and related factors, such as fluctuating or increasing levels of unemployment, underemployment and the volatility of fuel prices, declines in the securities and real estate markets, and perceptions of these conditions that decrease the level of disposable income of consumers or consumer confidence; adverse events impacting the security of travel, such as terrorist acts, armed conflict and threats thereof, acts of piracy, and other international events; the risks and increased costs associated with operating internationally; our expansion into and investments in new markets; breaches in data security or other disturbances to our information technology and other networks; the spread of epidemics and viral outbreaks; adverse incidents involving cruise ships; changes in fuel prices and / or other cruise operating costs; any impairment of our tradenames or goodwill; our hedging strategies; our inability to obtain adequate insurance coverage; our substantial indebtedness, including the ability to raise additional capital to fund our operations, and to generate the necessary amount of cash to service our existing debt; restrictions in the agreements governing our indebtedness that limit our flexibility in operating our business; the significant portion of our assets pledged as collateral under our existing debt agreements and the ability of our creditors to accelerate the repayment of our indebtedness; volatility and disruptions in the global credit and financial markets, which may adversely affect our ability to borrow and could increase our counterparty credit risks, including those under our credit facilities, derivatives, contingent obligations, insurance contracts and new ship progress payment guarantees; fluctuations in foreign currency exchange rates; overcapacity in key markets or globally; our inability to recruit or retain qualified personnel or the loss of key personnel; future changes relating to how external distribution channels sell and market our cruises; our reliance on third parties to provide hotel management services to certain ships and certain other services; delays in our shipbuilding program and ship repairs, maintenance and refurbishments; future increases in the price of, or major changes or reduction in, commercial airline services; seasonal variations in passenger fare rates and occupancy levels at different times of the year; our ability to keep pace with developments in technology; amendments to our collective bargaining agreements for crew members and other employee relation issues; the continued availability of attractive port destinations; pending or threatened litigation, investigations and enforcement actions; changes involving the tax and environmental regulatory regimes in which we operate; and other factors set forth under «Risk Factors» in our most recently filed Annual Report on Form 10 - K and subsequent filings by the Company with the Securities and Exchange Csecurities and real estate markets, and perceptions of these conditions that decrease the level of disposable income of consumers or consumer confidence; adverse events impacting the security of travel, such as terrorist acts, armed conflict and threats thereof, acts of piracy, and other international events; the risks and increased costs associated with operating internationally; our expansion into and investments in new markets; breaches in data security or other disturbances to our information technology and other networks; the spread of epidemics and viral outbreaks; adverse incidents involving cruise ships; changes in fuel prices and / or other cruise operating costs; any impairment of our tradenames or goodwill; our hedging strategies; our inability to obtain adequate insurance coverage; our substantial indebtedness, including the ability to raise additional capital to fund our operations, and to generate the necessary amount of cash to service our existing debt; restrictions in the agreements governing our indebtedness that limit our flexibility in operating our business; the significant portion of our assets pledged as collateral under our existing debt agreements and the ability of our creditors to accelerate the repayment of our indebtedness; volatility and disruptions in the global credit and financial markets, which may adversely affect our ability to borrow and could increase our counterparty credit risks, including those under our credit facilities, derivatives, contingent obligations, insurance contracts and new ship progress payment guarantees; fluctuations in foreign currency exchange rates; overcapacity in key markets or globally; our inability to recruit or retain qualified personnel or the loss of key personnel; future changes relating to how external distribution channels sell and market our cruises; our reliance on third parties to provide hotel management services to certain ships and certain other services; delays in our shipbuilding program and ship repairs, maintenance and refurbishments; future increases in the price of, or major changes or reduction in, commercial airline services; seasonal variations in passenger fare rates and occupancy levels at different times of the year; our ability to keep pace with developments in technology; amendments to our collective bargaining agreements for crew members and other employee relation issues; the continued availability of attractive port destinations; pending or threatened litigation, investigations and enforcement actions; changes involving the tax and environmental regulatory regimes in which we operate; and other factors set forth under «Risk Factors» in our most recently filed Annual Report on Form 10 - K and subsequent filings by the Company with the Securities and Exchange CSecurities and Exchange Commission.
To keep a close liaison and coordination with state security elements for the activities — the use of armed escort as much as possible and maintaining strong security training and awareness for the personnel; careful selection of all election related sites and the maintenance of security for polling staff, electoral materials and equipment and situational awareness through a well - developed public information strategy to support election operation and ensure timely distribution of security information / advisories; identify hotspots (fragile security locations) in coordination with the Security Agencies and the most likely threats in each constituency and provide a clear order of priority for concerted efforts to be made to mitigate and manage these concerns and to allow resources to be targeted for maximumsecurity elements for the activities — the use of armed escort as much as possible and maintaining strong security training and awareness for the personnel; careful selection of all election related sites and the maintenance of security for polling staff, electoral materials and equipment and situational awareness through a well - developed public information strategy to support election operation and ensure timely distribution of security information / advisories; identify hotspots (fragile security locations) in coordination with the Security Agencies and the most likely threats in each constituency and provide a clear order of priority for concerted efforts to be made to mitigate and manage these concerns and to allow resources to be targeted for maximumsecurity training and awareness for the personnel; careful selection of all election related sites and the maintenance of security for polling staff, electoral materials and equipment and situational awareness through a well - developed public information strategy to support election operation and ensure timely distribution of security information / advisories; identify hotspots (fragile security locations) in coordination with the Security Agencies and the most likely threats in each constituency and provide a clear order of priority for concerted efforts to be made to mitigate and manage these concerns and to allow resources to be targeted for maximumsecurity for polling staff, electoral materials and equipment and situational awareness through a well - developed public information strategy to support election operation and ensure timely distribution of security information / advisories; identify hotspots (fragile security locations) in coordination with the Security Agencies and the most likely threats in each constituency and provide a clear order of priority for concerted efforts to be made to mitigate and manage these concerns and to allow resources to be targeted for maximumsecurity information / advisories; identify hotspots (fragile security locations) in coordination with the Security Agencies and the most likely threats in each constituency and provide a clear order of priority for concerted efforts to be made to mitigate and manage these concerns and to allow resources to be targeted for maximumsecurity locations) in coordination with the Security Agencies and the most likely threats in each constituency and provide a clear order of priority for concerted efforts to be made to mitigate and manage these concerns and to allow resources to be targeted for maximumSecurity Agencies and the most likely threats in each constituency and provide a clear order of priority for concerted efforts to be made to mitigate and manage these concerns and to allow resources to be targeted for maximum effect.
In Westchester County Executive Rob Astorino said the county is part of the Joint Terrorist Task Force, enabling officials to receive real - time information from the FBI and Homeland Security in case of a threaIn Westchester County Executive Rob Astorino said the county is part of the Joint Terrorist Task Force, enabling officials to receive real - time information from the FBI and Homeland Security in case of a threain case of a threat.
A recent study published in the Journal of Management Information Systems suggests information security managers and supervisors could have greater success in motivating employees to act more securely by avoiding cold, authoritative commands, and instead create security messages that are relatable and provide options for how employees can better protect information and respond Information Systems suggests information security managers and supervisors could have greater success in motivating employees to act more securely by avoiding cold, authoritative commands, and instead create security messages that are relatable and provide options for how employees can better protect information and respond information security managers and supervisors could have greater success in motivating employees to act more securely by avoiding cold, authoritative commands, and instead create security messages that are relatable and provide options for how employees can better protect information and respond information and respond to threats.
Despite the website being much more private than most other internet dating websites, allowing for less shared information and possible security threats, it still publishes an in depth safety section.
In the event of a known security or virus threat, we may collect information on the web content you view.
In a government - wide effort to combat security and virus threats, we may share some information we collect automatically, such as IP address, with other Federal government agencies.
In a government - wide effort to combat security and virus threats, we may share some information we collect automatically, such as IP address, with other federal government agencies.
Why Zimperium is a Top Computer Security Blog: Readers interested in mobile security, be it the latest malware or what security experts have learned from past attacks and threats, will glean some great information from thSecurity Blog: Readers interested in mobile security, be it the latest malware or what security experts have learned from past attacks and threats, will glean some great information from thsecurity, be it the latest malware or what security experts have learned from past attacks and threats, will glean some great information from thsecurity experts have learned from past attacks and threats, will glean some great information from this blog.
Why Seculert Blog is a Top Computer Security Blog: This blog's in - depth dives into the biggest computer security threats of the day will be of particular interest to information security profesSecurity Blog: This blog's in - depth dives into the biggest computer security threats of the day will be of particular interest to information security professecurity threats of the day will be of particular interest to information security professecurity professionals.
Why FireEye Blog is a Top Computer Security Blog: FireEye is a leader in advanced security threat detection, and their blog is an oft - updated repository of the latest research for anyone who wants to stay up - to - date on the most important information security Security Blog: FireEye is a leader in advanced security threat detection, and their blog is an oft - updated repository of the latest research for anyone who wants to stay up - to - date on the most important information security security threat detection, and their blog is an oft - updated repository of the latest research for anyone who wants to stay up - to - date on the most important information security security matters.
Towerwall's blog provides information on the latest developments in the digital security industry, as well as thoughts on the latest attacks and threats and how to head them off.
Attack vectors change constantly — those of us in information security have a deep sense of humility in the face of constant changes in threats as well as technology, policies and training to defend against those threats.
Confidential data in computers and information systems, including those used by attorneys and law firms, faces greater security threats today than ever before.
For further reading on the threat of cyber risks, and why law firms are considered to be lucrative targets, see Locked Down: Practical Information Security for Lawyers and the ABA Cybersecurity Handbook, both available in the practicePRO lending library (practicePRO.ca / library) as well as December 2013 Cybersecurity issue of LawPRO Magazine
The HHS checklist offers general, step - by - step guidance for healthcare providers in the event of a security incident that includes: (1) immediately executing response procedures and contingency plans to fix technical problems to stop a security incident; (2) reporting a security incident to appropriate law enforcement agencies; (3) reporting all cyber threat indicators to federal and information - sharing analysis organizations; and (4) reporting a breach to the HHS as soon as possible (but no later than 60 days after the discovery of a breach affecting 500 or more individuals).
The security standard authority applies to both the transmission and the maintenance of health information, and requires the entities described in section 1172 (a) to maintain reasonable and appropriate safeguards to ensure the integrity and confidentiality of the information, protect against reasonably anticipated threats or hazards to the security or integrity of the information or unauthorized uses or disclosures of the information, and to ensure compliance with part C by the entity's officers and employees.
If a business experiences a security breach where personal information that, combined, may pose a threat to a consumer if misused, that business must notify any affected consumers residing in Maryland.
Mark Hammell, manager of Threat Infrastructure team at Facebook, explained in a post that ThreatExchange will be used for exchanging security threat information and can be considered as the world's first scalable threat fight data cThreat Infrastructure team at Facebook, explained in a post that ThreatExchange will be used for exchanging security threat information and can be considered as the world's first scalable threat fight data cthreat information and can be considered as the world's first scalable threat fight data cthreat fight data center.
He cited several examples: Found and took down 30,000 fake accounts leading up to the presidential election in 2017 Worked with the Federal Office for Information Security in Germany to learn about threats detected and to share information before the 2017 elections Deployed new AI tools to detect and remove fake accounts from Macedonia spreading misinformation in the US Senate Alabama special electiInformation Security in Germany to learn about threats detected and to share information before the 2017 elections Deployed new AI tools to detect and remove fake accounts from Macedonia spreading misinformation in the US Senate Alabama special electiinformation before the 2017 elections Deployed new AI tools to detect and remove fake accounts from Macedonia spreading misinformation in the US Senate Alabama special election in 2017.
Jim Routh, Chief Information Security Officer at Aetna who is a member of the GCA Strategic Advisory Committee, stated, «Spear phishing is increasing in both frequency and sophistication, and represents a real threat to companies large and small.
«While the security threats such as virtual currency speculation and hacking of handling sites are increasing, the actual situation of personal information protection of major virtual currency exchanges is very weak,» warned the chairman of the Korea Communications Commission in announcing the fines.
In a statement on his site, he says that technology coming from the country poses a threat to national security, and that use of this equipment «would be inviting Chinese surveillance into all aspects of our lives,» and cites US Intelligence and counterintelligence officials who say that Huawei has shared information with state leaders, and that the its business in the US is growing, representing a further security risIn a statement on his site, he says that technology coming from the country poses a threat to national security, and that use of this equipment «would be inviting Chinese surveillance into all aspects of our lives,» and cites US Intelligence and counterintelligence officials who say that Huawei has shared information with state leaders, and that the its business in the US is growing, representing a further security risin the US is growing, representing a further security risk.
Microsoft officials said they also are using «cloud intelligence» in the form of information from the Intelligent Security Graph, plus data science and machine learning to identify threats and improve protection provided by Windows Defender Antivirus.
The company, whose objective is to incentivize information security experts to build anti-malware engines that compete to protect against threats, last Monday announced that Los Angeles - based startup studio, Science Inc. would be investing in its plans to disrupt the USD 8.5 billion cyber threat intelligence industry.
Member of the Computer Security Information Response Center (CSIRC) participating in incident analysis, response and threat assessment on a daily basis.
Utilize the most advanced tools for improving security by tracking new developments in rapidly changing information security field and threat landscape.
Familiar with multiple information security tools such as; SIEM Qradar, Intrusion Detections and Preventions Systems (Sourcefire), Malware Analysis (Hydra Threat Analyzer, VirusTotal), email analysis in Rshield and Sureview, intelligence analysis (CRITs), proxy searches (Putty) and).
Results oriented information technology professional with extensive experience in management, network security, server administration, threat detection and mitigation.
With more than 7 years of systems and security engineering experience in information security, providing guidance to the enterprise for the information security programs for government entities demonstrating knowledge of assessing threats, risks, and vulnerabilities from emerging security issues.
Investigations and Law Enforcement — Selected Duties & Responsibilities Build and implement investigations programs and security solutions to enable effective organizational administration, threat detection / elimination, conflict / issue resolution, and other critical discovery functions Utilize various technical applications, including cameras, A / V equipment, transmitters, recorders, and bugs, to generate valuable information and isolate parties responsible for criminal and civil malfeasance Create issue and security reports to enable development of new policies and procedures aimed at preventing further wrongdoing and protect valuable resources team Integrate investigative principles into corporate strategic mission, ensuring management and program accountability, proactive prevention of discrimination, case efficiency, and legal analysis Perform security and crime analyses of firm infrastructure against related compliance requirements as well as on - going vulnerability assessments to continuously mitigate risk Develop investigatory standard documents to serve as guide and rules resources to promote fair and legal probes Supervise related departmental staff, including performance plan development and assessment, technical oversight, personnel recruitment and training, staff discipline, and other pertinent functions Work as a member of the corporate incident response team in the execution of all related tasks, including incident response plan development, damage minimization, resource restoration, and firm integrity protection Communicate all issues and user feedback to members of management, law enforcement professionals, and other interested parties, generating situational reports and follow - up recommendations based on investigatory results Maintain a strong working knowledge of all software, hardware, applications, techniques, trends and other critical tools which aid in effective investigation React quickly based upon limited and confidential information, drawing upon extensive police and military experience in tense, complicated situations Collaborate in the preparation of necessary legal documents, including search and arrest warrants Assist management with various other duties as assigned
Georgetown University Medical Center (Washington, DC) 05/2007 — 01/2010 Imaging Science and Information Systems Center — Insert Title • Train, supervise, and assure the work quality of a team of 3 - 6 regional analysts • Write analytical summaries of open source collections of biological threats and other national security threats • Develop and refine indication and warning methodologies and taxonomies for biological and radiological threats • Offer guidance and expertise on intelligence community interagency fusion cell for H1N1 «swine flu» • Assist in research and development work on plant health project • Conduct case studies on state and non-state actor biological weapons programs and orphan source radiological incidents • Participate in multi-agency tracking of nuclear proliferation activities in Eastern Europe, Central Asia, and the Middle East • Perform project lead duties, participate in the selection process of new employees, and assist with performance appraisals • Awarded the National Intelligence Medallion for organizational work on Project Argus
«Companies of all sizes need to start taking proactive measures to ensure their employees are trained on destruction procedures, that sensitive information is stored securely, and that they're mitigating information security threats by disposing of paper and electronic devices in a timely fashion.»
a b c d e f g h i j k l m n o p q r s t u v w x y z