CyberSecurity


Building the NaaS Experience: Connect, Innovate, Transform at MEF’s Global Event

MEF’s Global Network-as-a-Service (NaaS) event (GNE) in Dallas, Texas 28-30 October brings together the entire NaaS ecosystem to discuss the vision of a new generation of NaaS and provide a snapshot of the industry for service providers, technology vendors, wholesale providers, retail providers, hyperscalers, system integrators and of course, the end-user enterprise community.



Into the Breach: Why Employees Remain the Achilles Heel

The past half decade has seen culture and flexibility springboard to the top of employees’ priority lists. As a recent survey conducted by job site Monster shows, 26% of U.S. workers would alarmingly rather get a root canal than work in the office five days a week, while 38% stated that they would consider quitting their jobs if they were told that they had to work in the office just one day a week.

Manufacturing is Top Targeted Industry for Cybercrime So Far in 2024

Critical Start, a provider of in Managed Detection and Response (MDR) cybersecurity solutions and a pioneer in Managed Cyber Risk Reduction (MCRR), recently released its biannual Cyber Threat Intelligence Report, featuring the top threats observed in the first half of 2024, and emerging cybersecurity trends impacting the manufacturing, healthcare, technology, professional services, engineering, and construction industries. The report also includes actionable insights to help organizations strengthen their security posture and proactively mitigate potential cyber risk.

72 Percent of Senior Executives Targeted by Cyberattacks in the Last 18 Months

Senior executives are prime targets for cybercriminals, with a staggering 72% of surveyed cybersecurity professionals in the US reporting that this group has been targeted by cyberattacks in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybersecurity Report, underscores the growing sophistication of attacks, including the rising use of AI-generated deepfakes, which have been involved in 27% of the attacks.

Government Sector Hit Hard By Ransomware Attacks According to New Report

ExtraHop recently released its global ransomware trends report, a data-driven analysis of ransomware impacts across geographies, industries, and organizations of different sizes.

Survey: More Than Half of IT Security Professionals Are Concerned About AI-Powered Threats

Pluralsight recently released results from a survey that polled over 200 technologists about cybersecurity and AI. The findings show that 56% of security professionals are concerned about AI-powered threats. Additionally, the survey explores the top cybersecurity skills in today’s tech landscape and emerging cybersecurity roles.

Cybersixgill Introduces Pulse: Disrupting Cyber Threat Intelligence with Personalized Content Stream

Cybersixgill, global cyber threat intelligence (CTI) data provider, announced today Cybersixgill Pulse, revolutionizing how threat analysts and security practitioners consume and act upon cybersecurity threat intelligence. Pulse is the first such offering that delivers personalized, streamed CTI content, individualized to each user according to relevance, usage patterns, interests, sector, and geography.

Safe's Newly Appointed Channel Chief To Aggressively Pursue $4 Billion Third-Party Cyber Risk Business

Safe Security, provider of AI-driven cyber risk management, announced today the appointment of Michael Nagao as Senior Vice President (SVP) of Worldwide Channel Sales and Alliances. Before joining Safe Security, Michael was Area Vice President - America's Channel for Rubrik, Inc., where he played a leadership role in delivering $800m + ARR channel business. Michael is leading the charge for Safe Security's drive to build a 100% channel first business.

Supply Chain Vulnerabilities: Addressing Cybersecurity Risks in Manufacturing Networks

Manufacturing networks are complex and interconnected, involving numerous stakeholders from suppliers to customers. This interconnectedness, while beneficial for efficiency, also introduces multiple entry points for cyber threats. As the manufacturing industry continues to embrace digitization, the need to secure networks becomes increasingly important.

Help Your Customer Protect Themselves

In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information.

Computers Beginning to Come Back Online After CrowdStrike Caused Crash Friday

Computers around the world are beginning to come back online after a defective update to Windows machines from cybersecurity provider CrowdStrike Friday affected almost 9 million machines.

Global IT Outage Cause by Faulty Update from Cybersecurity Provider CrowdStrike

Systems are starting to come back online after a global IT outage on Friday disrupted everything from airline operations to banks and 911 call centers.

Study Proves It: Security Awareness Training Reduces Phishing Attacks

Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches. 

Report Shines Spotlight on Cybersecurity Crisis in Healthcare Sector

KnowBe4 recently released its International Healthcare Report. The report takes a closer look at the cybersecurity crisis currently experienced by the healthcare sector, in particular hospital groups, across the world.

91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money.

Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams.

Secure Storage Drives Give Sensitive Data at the Edge New Protection

Emerging technologies and evolving mission requirements are driving significant expansion of sensitive data at the edge. A growing portfolio of systems -- from PCs to unmanned vehicles, drones and IoT devices -- are collecting, processing, and storing sensitive data.

Survey: 79 Percent of U.S. Business Leaders Using AI to Enhance Fraud Prevention Efforts

The US economy is facing a significant surge in online fraud, with nearly 90% of business leaders reporting it costs them up to 9% of their annual revenue. This is a key finding from the Veriff Fraud Industry Pulse Survey 2024, which surveyed hundreds of senior decision-makers and fraud leaders across various sectors in the US.

Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines.

Survey: 70 Percent of Organizations Have Established Dedicated SaaS Security Teams

Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey Report: 2025 CISO Plans and Priorities released today by the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3