Many of the cyberattacks on state, local, tribal and territorial governments are not complicated and could be avoided through simple steps such as improved cyber hygiene and two-factor authentication, a new report states.
- By Stephanie Kanowitz
- Sep 08, 2020
Video surveillance is commonplace today, but many organizations don’t even realize that they aren’t fully leveraging the video data that their cameras capture. Traditionally, law enforcement and physical security teams use video cameras to monitor areas in real-time and to review footage to glean evidence for post-incident investigation.
- By Stephanie Weagle
- Sep 03, 2020
USB drives are convenient devices. They are used daily by hundreds of millions of people around the world to store or transport data, much of which would be considered confidential. Chances are there are plenty of USB drives floating around your company or organization right now.
- By Richard Kanadjian
- Sep 03, 2020
Cloud security is an increasing concern as more organizations transition to use public cloud providers in either a hybrid or cloud-native model.
- By Cliff Krahenbill
- Aug 07, 2020
As the Internet of Things (IoT) becomes mainstream, companies are delving into the ramifications of adoption, including its benefits, challenges, and opportunities--not least, the implications to security and cybersecurity.
- By Steven Turney
- Jul 30, 2020
Prior to the COVID-19 pandemic, the rate of cloud adoption was growing steadily. Since March, however, when “shelter-in-place” orders began sweeping the nation, we’ve seen cloud computing usage skyrocket.
- By Joe Vadakkan
- Jul 30, 2020
In the battle for security budget funding, enterprise key management isn’t nearly as sexy as technologies such as threat hunting or blockchain cybersecurity.
- By David Greene
- Jul 21, 2020
Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionally, the ability to protect data and code is limited in conventional computing infrastructure.
Security automation engine used to establish standardized and efficient screening procedures for staff and visitors
SAFR from RealNetworks, Inc. has announced SAFR® Inside, a new app component of its Facial Recognition and Computer Vision Platform that runs on ACAP enabled cameras with edge processing capabilities. SAFR Inside reduces network traffic and server overhead and thus lowers overall deployment costs.
The Defense Advanced Research Projects Agency is inviting security researchers to find vulnerabilities in its System Security Integration Through Hardware and Firmware systems.
In this pandemic of coronavirus, all organizations have shifted from office work to remote work. By saying that, you must have heard about VPNs, and how they improve security and privacy.
- By Susan Alexandra
- Jun 02, 2020
With the global digital transformation, many of the interactions that enterprises have with their customers are shifting online.
- By Ralph C. Jensen
- May 28, 2020
Not all internet users are careless about their online security. But many are still victims of cybercriminals and stalkers due to mistakes online.
- By Waqas Baig
- May 18, 2020
Industry associations keeping members informed about how the coronavirus crisis is affecting security businesses.
- By Ralph C. Jensen
- May 14, 2020
With growing number of breaches, there is a huge need for more advanced measures to protect public sector data.
- By Warren Poschman
- May 12, 2020
Endpoints are common targets for ransomware and cryptojacking attackers. Here are the solutions available to address those risks.
- By Ilai Bavati
- May 11, 2020
The Star Wars series provides good examples that we can use as lessons to combat scammers attempting to profit from COVID-19, writes Tyler Reguly.
- By Tyler Reguly
- May 04, 2020
After customers reported fraudulent purchases, Nintendo announced that a credential stuffing campaign led to breaches of thousands of accounts.
- By Haley Samsel
- Apr 27, 2020
Nearly 450 active email addresses and passwords used by WHO staff have been leaked online, and the public has received email scams from people posing as staff.
- By Ralph C. Jensen
- Apr 24, 2020