CyberSecurity


Strata Identity Names Erik Ruby Head of Sales to Lead Market Expansion for Identity Orchestration Platform

Strata Identity, the Identity Orchestration company, recently announced that Erik Ruby has joined the company as Head of Sales. The former Sumo Logic and SnapLogic executive brings a wealth of cloud security, SaaS, and infrastructure domain expertise to Strata’s management team and will lead market expansion for the Maverics Identity Orchestration platform.



Cigent Pre-Boot Authentication Approved for Inclusion on National Security Agency Central Security Service Components List

Cigent Technology Inc, recently announced that its pre-boot authentication software has been approved for inclusion on the National Security Agency Central Security Service (NSA/CSS) components list for the Commercial Solutions for Classified (CSfC) program.

Survey: 68 Percent of IT Workers Feel Overwhelmed by Data Access Restrictions

CData Software, a provider of data connectivity solutions, recently released its research report, “Data Connectivity: The Missing Link for IT,” to offer insights into the current state of data connectivity among organizations and reveal how businesses can get the most out of their data in 2024. The survey, conducted among 550 data and analytics professionals across Operations (Ops) and IT in organizations with over 200 employees, found that increasing data requests overwhelm IT teams, but security concerns hinder their ability to provide employees with access to timely data

Navigating the SASE Landscape

Networking and security have traditionally been separate solutions layered into complex architectures. While some vendors attempted to combine security into their networking gear, this often meant throwing more boxes at customers or stitching basic filtering into their gear. This further complicated corporate infrastructures by deploying multiple tools from multiple vendors, and none of them seamlessly worked well together or shared context. Realizing this chaos required a better solution. Several vendors pursued efforts to bring networking and security together in a single solution, to varying degrees of success. And in 2019, Gartner defined these efforts as SASE, or Secure Access Service Edge.

Precision Computer Services Forges Strategic Partnership with Third Wave Innovations to Enhance Client Cybersecurity and Compliance

Third Wave Innovations, an integrated risk solutions provider for network and security operations, today announced a strategic partnership with Precision Computer Services (PCS), a nationally recognized IT systems integrator.

Report: Cyber Event is the Top Global Business Risk of 2024

Cyber incidents such as ransomware attacks, data breaches, and IT disruptions are the biggest worry for companies globally in 2024, according to the Allianz Risk Barometer. The closely interlinked peril of Business interruption ranks second. Natural catastrophes (up from #6 to #3 year-on-year), Fire, explosion (up from #9 to #6), and Political risks and violence (up from #10 to #8) are the biggest risers in the latest compilation of the top global business risks, based on the insights of more than 3,000 risk management professionals.

Survey: 77 Percent of Financial Organizations Experienced Cyberattack in Last 12 Months

Netwrix, a cybersecurity vendor that makes data security easy, recently revealed additional findings for the financial, banking and accounting sector from its survey of 1,610 IT and security professionals from more than 100 countries. According to the report, within the last 12 months, 77% of financial organizations detected a cyberattack, compared to 68% among other industries. Phishing and ransomware were the most common types of attacks across all sectors.

Survey: 39 Percent of IT Professionals Say Phishing is the Most Feared Cyberattack

Axiad, a provider of organization-wide passwordless orchestration, today announced the results of its 2023 State of Authentication Survey. The survey investigated the types of cyberattacks respondents were most afraid of and prepared for, how their organizations held up against password-based attacks, if and why companies are still using passwords, and what cybersecurity technologies companies plan to use in 2024.

Security Today Announces 2023 CyberSecured Award Winners

Security Today is pleased to announce the 2023 CyberSecured Awards winners. Fifteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today.

Cybersixgill Unveils Identity Intel Model for Threat Intelligence

Cybersixgill, a cyber threat intelligence data provider, announced today new features and capabilities that take security teams’ threat detection and mitigation efforts to new levels, helping them identify and mitigate vulnerabilities and detect and stop threats more quickly and effectively than ever before.

Panther Unveils Security Data Lake Search and Splunk Integration to Redefine Detection and Response at Scale

Panther Labs, a cybersecurity innovator for detection and response at scale, today announced the launch of its new Security Data Lake Search and Splunk Integration capabilities. These offerings mark a critical leap forward in managing security risks in today’s cloud-first landscape.

Free Cybersecurity Certificate Series Help Organizations and Individuals Protect from Cyber Attacks

With the growing frequency, sophistication and magnitude of cyberattacks around the world, the Texas A&M Engineering Extension Service (TEEX) has established a new cybersecurity certificate series to help the public and private sector protect their organizations and data.

Interface Systems Appoints New Leaders to its Executive Team

Interface Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, today announced that Sean Foley has been appointed to the role of chief revenue officer and Sunita Mani to the role of chief marketing officer.

What the New SEC Cybersecurity Rules Mean for Tech Companies

On July 26, the US Securities & Exchange Commission (SEC) released a new rule aimed to increase consistency of how and when material cybersecurity information is disclosed to investors and the public. The rule became effective Sept 5, 2023.

Five Cybersecurity Trends Predictions for 2024

According to Cybersixgill, threat research experts, AI’s evolution will continually improve both organizations’ cyber defense efforts and cybercriminal activities. At the same time, increasingly complex regulatory requirements, continued consolidation of cybersecurity tools, a widening attack surface, and heightened global geopolitical issues will all play a significant role in driving the direction of cybersecurity.

NSA Report Focuses on How to Protect Against Evolving Phishing Attacks

The National Security Agency (NSA) and U.S. partners have released a new report describing the latest techniques in phishing attacks and the defenses organizations can deploy against them.

Report Shows 1,265 Percent Increase in Phishing Emails Since ChatGPT Launch

SlashNext, provider of SaaS-based Integrated Cloud Messaging Security across email, web, and mobile, today released the SlashNext State of Phishing Report for 2023.

MEF’s Inaugural Global Network-as-a-Service Event: Accelerating NaaS Innovation and Security Certification

Earlier this month, MEF, a global industry association of network, cloud, security and technology providers, hosted its first annual Global Network-as-a-Service Event (GNE). The goal of GNE was to bring together top executives from the emerging NaaS (Network-as-a-Service) ecosystem to discuss the latest trends and technologies to help companies achieve their digital transformation goals.

Research Reveals Nearly Half of Organizations Underestimate Risk Level

Veritas Technologies, a provider of secure multi-cloud data management, recently released findings of new research that shows 45% of organizations may be miscalculating the severity of threats to their business. The study, Data Risk Management: The State of the Market—Cyber to Compliance, which polled 1,600 executives and IT practitioners across 13 global markets, provides insights into the most pressing risks, their impacts and how organizations plan to navigate them.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3