CyberSecurity


Scaling Security with GPUs/DPUs for AI and Machine Learning

Scaling Security with GPUs/DPUs for AI and Machine Learning

On March 25, before the full impact of coronavirus hit home and the world was still full of hope, Google News showed an eye-wateringly appealing headline: Cybercrime Gangs Promise to Stop Attacks on Healthcare Organizations During the COVID-19 Crisis.



Can Zero Trust Be Trusted

It’s no surprise that cyber security defenses took their first cues from the physical world. Castles have moats. Your house has a door with a lock. It makes sense to protect your network with a firewall. But cyber criminals soon crashed that plane.

Holiday Security Tips for Malls or Outdoor Shopping Areas

Holiday Security Tips for Malls or Outdoor Shopping Areas

The holiday shopping season is here, let’s not forget that we are in COVID-19 pandemic and health officials continue to repeat their messages about the importance of masks, adequate social distancing, and frequent handwashing.

Chinese-made routers, sold on Amazon and eBay, contain hidden backdoor and are being exploited by Mirai malware and other methods

CyberNews.com’s Investigations team today announced that they have identified hidden backdoors in Chinese-manufactured routers that share common firmware, with evidence that the routers are being exploited by the Mirai malware.

Election Security Separating Rumor from Reality

Election Security: Separating Rumor from Reality

Here is a Q&A that answers questions about spoofing the voter. The answers come from Chris Krebbs, CISA director.

Acting Secretary Chad Wolf Condemns Censorship of Government Officials as a Security Threat, Calls on Twitter to End it

In an open letter to Twitter CEO Jack Dorsey, Department of Homeland Security (DHS) Acting Secretary Chad F. Wolf today called on Twitter to no longer obstruct Americans’ unalienable right to communicate with each other, their government, and its officials on the platform, because doing so endangers the national security.

Voting Security: Did Your Vote Count?

Voting Security: Did Your Vote Count?

The most recent elections is the most secure in the nation’s history. Or, is it? Government officials say it is the most secure ever.

Securing Our Election

Securing Our Election

The 2020 election season is a Big Deal as well it should be. The Vote, as foundational parts of the whole, is complicated in practice with history showing us just how complicated it can be. Protecting the process and making sure the Vote is fair, secure, and timely, is vital to American Democracy.

Trump Administration, DHS Fight to Ensure American Technological Advantage and Competitiveness on Innovative Technologies

Trump Administration, DHS Fight to Ensure American Technological Advantage and Competitiveness on Innovative Technologies

The Trump Administration continues its work to ensure America’s technological and innovative edges are guaranteed by offering the first National Strategy for Critical and Emerging Technology.

Law Enforcement Data “Blue Leaker”: a Danger or a Public Service?

Law Enforcement Data “Blue Leaker”: a Danger or a Public Service?

The recent release of a massive cache of sensitive Law Enforcement data has been in the news recently. The trove of roughly 270 gigabytes of data posted to the Denial of Secrets website has been referred to as “BlueLeaks.”

Newly Founded Cybersecurity Startups Raise More Than $31 million in 2020

Newly Founded Cybersecurity Startups Raise More Than $31 million in 2020

According to data presented by the Atlas VPN team, there are 78 new cybersecurity companies founded in 2020 that cumulatively have raised over $31.6 million in funding year-to-date.

ConnectWise Launches Bug Bounty Program to Help Detect Security Vulnerabilities

Crowdsourcing effort to uncover security issues is latest addition to company’s broader cybersecurity strategy

Companies should know the real risks of cyber-physical security

Due to the nature of cyber-physical systems (CPSs), incidents can quickly lead to physical harm to people, destruction of property or environmental disasters. Gartner analysts predict that incidents will rapidly increase in the coming years due to a lack of security focus and spending currently aligning to these assets.

Managing Non-Human Identity Explosion in the Public Cloud

With digital transformation comes the move to the cloud. What many businesses don’t realize is that it requires a retooling of their security strategy from the ground up.

McAfee Brings Consumers an Integrated Security Experience from Home

McAfee today announced its latest consumer security portfolio that includes enhanced products with better user experiences such as a native VPN and new features, including integrated social media and tech scam protection.

The Role of Confidential Computing in Protecting Cloud Applications and Sensitive Data from Breaches

According to the Confidential Computing Consortium: “Confidential computing is the protection of data in use using hardware-based Trusted Execution Environments (TEE).

SIA issues policy on ethical use of facial recognition

SIA issues policy on ethical use of facial recognition

The Security Industry Association (SIA) has released its new policy principles guiding the development and deployment of facial recognition technology.

Trump Administration Launches First Cybersecurity Principles for Space Technologies

The Trump Administration announced the first comprehensive cybersecurity policy for systems used in outer space and near space Sept. 4.

Cyberattacks on state, local government up 50%

Many of the cyberattacks on state, local, tribal and territorial governments are not complicated and could be avoided through simple steps such as improved cyber hygiene and two-factor authentication, a new report states.

Using AI Power

Using AI Power

Video surveillance is commonplace today, but many organizations don’t even realize that they aren’t fully leveraging the video data that their cameras capture. Traditionally, law enforcement and physical security teams use video cameras to monitor areas in real-time and to review footage to glean evidence for post-incident investigation.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3