CyberSecurity


MEF’s Inaugural Global Network-as-a-Service Event: Accelerating NaaS Innovation and Security Certification

Earlier this month, MEF, a global industry association of network, cloud, security and technology providers, hosted its first annual Global Network-as-a-Service Event (GNE). The goal of GNE was to bring together top executives from the emerging NaaS (Network-as-a-Service) ecosystem to discuss the latest trends and technologies to help companies achieve their digital transformation goals.



Research Reveals Nearly Half of Organizations Underestimate Risk Level

Veritas Technologies, a provider of secure multi-cloud data management, recently released findings of new research that shows 45% of organizations may be miscalculating the severity of threats to their business. The study, Data Risk Management: The State of the Market—Cyber to Compliance, which polled 1,600 executives and IT practitioners across 13 global markets, provides insights into the most pressing risks, their impacts and how organizations plan to navigate them.

Protecting Cloud Apps Common in Healthcare with API Security

Protecting Cloud Apps Common in Healthcare with API Security

Many healthcare information systems (HIS) applications rely on APIs to exchange data and interact with external systems. With the increasing adoption of cloud computing, the usage of APIs has grown exponentially in healthcare

CISO Global Listed on PCI Marketplace as Qualified Security Assessor

CISO Global, an industry leader as a managed cybersecurity and compliance provider, has been added to the PCI Marketplace as a PCI Quality Security Assessor (QSA).

NSC, CISA Highlight Top Cyber Misconfigurations

NSC, CISA Highlight Top Cyber Misconfigurations

Damaging cyber intrusions are far too common, causing harm to public and private organizations across every sector. While some of these intrusions use novel methods to gain access or move across a network, many exploit common misconfigurations. By ensuring strong configurations, we can significantly reduce the prevalence and impact of cyber-attacks.

CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

The Cybersecurity and Infrastructure Security Agency (CISA) recently announced the kickoff of the 20th Cybersecurity Awareness Month. Throughout October, CISA and the National Cybersecurity Alliance (NCA) will focus on ways to “Secure Our World” by educating the public on how to stay safe online.

Banking on the Cloud

Banking on the Cloud

Walk the GSX or ISC West show floor and you will see ample evidence that cloud has arrived. Cloud (and cloud-like) video surveillance providers are entering the market and exhibiting at trade shows.

Will AI Rid The Need For Cybersecurity Experts And Service Providers?

Will AI Rid The Need For Cybersecurity Experts And Service Providers?

When mechanized looms were first introduced, workers protested because they feared the automation would rob them of their skilled craft. When ATMs first arrived, some foretold the demise of bank tellers. When self-service kiosks were introduced, everyone believed they would replace cashiers. While technological shifts may have caused job losses in certain sectors, it could be argued that automation simply transformed the nature of work, or altered the responsibilities of workers instead of eliminating jobs. In fact, history shows that societal changes due to advances in technology have created more jobs than not.

12 Commercial Crime Sites to Do Your Research

12 Commercial Crime Sites to Do Your Research

Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust?

Report: DDoS Attacks Up 200 Percent in First Half of 2023

Zayo Group Holdings Inc. recenrly announced its annual Distributed Denial of Service (DDoS) Insights Report, analyzing DDoS attack activity and impact across industries in the first half of 2023.

The Benefits of OT, IT Collaboration

The Benefits of OT, IT Collaboration

It is no secret: OT and IT are converging. Physical security devices that were previously air gapped or standalone are now connected to a network, and with physical security devices more affordable than ever, the number of connected devices continues to grow. However, just because the technology itself is converging, that does not mean the human side of OT and IT are following suit.

AlertEnterprise Selected by GRC Outlook as One of the Top GRC Solution Providers in 2023

AlertEnterprise, the only provider of three dimensional governance, risk, and compliance (GRC) solutions, has been recognized by GRC Outlook as one of the Top 10 GRC solution providers in 2023.

The Knowledge, Intention and Behavior Gap in Cybersecurity: How to Close It

While technology plays a crucial role in strengthening organizational defenses, it is not the sole solution to cybersecurity challenges. Cybercriminals understand that the easiest way to breach an organization, even those with top-notch security controls, is through exploiting the human element.

Survey: 56 Percent of IT Professionals Optimistic About Future of AI Threat Detection

OPSWAT recently published the results of its Threat Intelligence Survey. The comprehensive survey included insights from over 300 IT professionals responsible for malware detection, analysis, and response within their organizations, and provides valuable and surprising insights into the evolving threat intelligence landscape as well as the challenges IT professionals face today.

Preventing Cybersecurity Threats with Physical Security Entrances

Cyber security and physical security convergence is a hot topic amongst today’s security professionals and rightfully so.

Cloud Security Made Simple: A Beginner

Cloud Security Made Simple: A Beginner's Guide for Business Owners

Most businesses are familiar with the benefits of the cloud, especially when it comes to economies of scale, remote teams, and cost efficiency. However, companies just approaching or have recently completed the migration process often need to pay more attention to one of its most essential aspects—security.

Inside Out Defense Takes Aim

Inside Out Defense Takes Aim

Although the focus of the new SEC cyber rulings are publicly traded companies, most organizations are not prepared to comply with the new reporting guidelines. In the final rule, organizations will be required to disclose processes for assessing, identifying and managing material risks from cybersecurity threats. 

Cybersixgill Raises the Bar on Generative AI

Cybersixgill, a global cyber threat intelligence data provider, has announced new enhancements to Cybersixgill IQ, its generative AI solution launched less than two months ago.

Just Why Are So Many Cyber Breaches Due to Human Error?

Often mentioned but seldom probed in the media is the biggest reason behind cybersecurity breaches—employee error. Two facts about this stand out. One is just how overwhelming employee errors are. The other is that the fault lies largely in the lap of companies themselves, not their workers.

A Dose of AI

A Dose of AI

What is Artificial Intelligence? We’ve all heard the term, but what does it mean? For some it evokes imagery of a cinematic world’s end; for others, it is the Easy Button come to reality.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.