CyberSecurity


New Malware Discovered Targeting Small Office/Home Office Routers

New Malware Discovered Targeting Small Office/Home Office Routers

For the third time in the past year, Black Lotus Labs–the threat research arm of Lumen Technologies– has discovered a new malware that targets small office/home office (SOHO) routers.



Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

OPSWAT, a provider of critical infrastructure protection (CIP) cybersecurity solutions, recently released the findings of its 2023 State of Web Application Security report, based on an online survey of over 400 executive leaders, managers, and senior contributors. The survey provides a deep dive into the evolving state of web applications and cloud infrastructure and highlights a concerning disconnect.

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Pluralsight recently released its second annual State of Cloud Report, which compiles survey results from more than 1,000 technologists and leaders in the United States, Europe, Australia, and India on the most current trends and challenges in cloud strategy and learning. The study findings reveal a large multicloud skills gap, underscoring how critical cloud skills development is for organizations to ensure the multicloud reward outweighs the risk.

Envisioning the Future After Deploying SASE

Envisioning the Future After Deploying SASE

Secure Access Service Edge (SASE) converges networking functions and security tools into a unified cloud-based service delivered at each edge. It fundamentally transforms how organizations approach enterprise networking and cybersecurity. As with any transformative initiative, gaining leadership support can be the biggest challenge. CSOs and CISOs must look beyond the technical considerations to emphasize the strategic and financial value SASE provides.

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

Veza recently announced that City of Las Vegas has deployed Veza to secure access to sensitive data and critical infrastructure as it moves from a centralized, legacy infrastructure to a hybrid, multi-cloud environment.

Winter is coming - is Your Access Management Process Recession-proof?

Last year, we survived the summer of ransomware and faced a potential global recession, higher inflation and geopolitical tension - a wobbly energy market and rising interest rates. The million-dollar question is what the state of an exhausted workforce means to cyber security, especially as recessions bring a high turnover rate.

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Keeper Security has recently released the results of its latest study, The Keeper Password Management Report: Unifying Perception with Reality. Assessing the password habits of over 8,000 individuals across the US, UK, France and Germany , the report reveals that 3 in 4 (75%) people globally don't adhere to widely-accepted password best practices, with a majority (64%) either using weak passwords or repeat variations of passwords to protect their online accounts.

MCi Protects its Customers Worldwide with Enterprise-grade Cyber Security

Serving state, local governments and global Fortune 100 companies in the energy, mining, manufacturing, and chemicals industries, Management Controls Inc. (MCi) needed to transform its cyber security to the world-class level expected by its long list of prestigious customers.

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Nearly three-quarters of all cyberattacks involve ransomware which means a majority of defenders are failing to detect ransomware successfully. The fact is, ransomware isn’t the first stage of the attack, it’s often the last stage; and cyberattacks usually get labeled or categorized as ransomware when data is encrypted or stolen and a ransom is demanded by cybercriminals.

How AI Platforms Like ChatGPT will Heighten Imposter Attacks—and How to Fight Them

How AI Platforms Like ChatGPT will Heighten Imposter Attacks—and How to Fight Them

Everyone in recent months has been busy either debating the merits of ChatGPT and similar natural language generators—or have been busy using them. The amount of material these AI-driven platforms will produce is mind-boggling, since there seems to be no shortage of businesses and content writers who feel they can benefit from the striking shortcuts these platforms provide. ChatGPT was in fact able to reach 100 million users in its first two months of public existence.

Metrasens and Transparent BPO Partner to Enhance Safety of Client Data

Metrasens and Transparent BPO Partner to Enhance Safety of Client Data

Metrasens, a provider of advanced detection systems for security and safety applications, is proud to announce its partnership with Transparent BPO, a business process outsourcing and contact center organization. This collaboration further enhances Transparent BPO’s already impressive security infrastructure to protect client data.

Survey: More Than 40% of IT Leaders Doubt Their Digital Infrastructure Is Prepared to Accommodate AI Tech

More than four in 10 IT leaders surveyed globally (42%) believe their existing IT infrastructure is not fully prepared for the demands of artificial intelligence (AI) technology, despite its widespread adoption across industries

Why Hackers Have Their Sights Set on Healthcare

Why Hackers Have Their Sights Set on Healthcare

We see it time and time again, the headlines splashed along newspapers and email newsletters that a hospital or its network of offices have been hit in a cybersecurity attack. Now more than ever, we continue to expect that attackers will target nursing homes, doctors’ offices, and other medical facilities due to the immense pressure the industry is facing to modernize. While the advancements in technology are vital to ensuring better patient care, they also open doors for threat actors everywhere.

Report: Advanced Phishing Attacks Grew By 356 Percent in 2022

A report recently published by Perception Point, a provider of advanced threat prevention across digital channels, has identified a 356% growth in the amount of advanced phishing attacks attempted by threat actors in 2022. Overall, the total number of attacks increased by 87%, highlighting the growing threat that cyber-attacks now pose to organizations.

Federal Agencies Reported More Than 30,000 Cyber Incidents In FY22

Federal Agencies Reported More Than 30,000 Cyber Incidents In FY22

In the fiscal year 2022, Federal agencies saw fewer cyber incidents overall, which decreased by around 6%.

The Need for a Comprehensive Strategy Addressing Cybersecurity and Quantum Technology

The Need for a Comprehensive Strategy Addressing Cybersecurity and Quantum Technology

Over the past two years, the Biden Administration has taken a series of steps centered on quantum and cybersecurity.

The Physical Security World and Beyond

A cybersecurity breach is one of the greatest risks organizations face today, especially given how connected our world is, including intelligent locks and access control systems. The potential impact of cybercrime is astounding.

Enhancing Situational Awareness

In an era marked by technological advancements and increasing security concerns, the integration of artificial intelligence (AI) into video surveillance systems has revolutionized situational awareness and critical infrastructure protection.

Survey: Insider Threats Surge Across U.S. Critical Infrastructure

Survey: Insider Threats Surge Across U.S. Critical Infrastructure

Over three-quarters (77%) of organizations across US critical national infrastructure (CNI) have seen a rise in insider-driven cyber threats in the last three years, according to new research by leading cyber security services firm Bridewell.

FTC Warns About Misuses of Biometric Information and Harm to Consumers

The Federal Trade Commission recently issued a warning that the increasing use of consumers’ biometric information and related technologies, including those powered by machine learning, raises significant consumer privacy and data security concerns and the potential for bias and discrimination.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3