CyberSecurity


Protecting Data is Critical

To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet.



New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022.

Cybersixgill Unveils Third-Party Intelligence, Exposing Threats to Organizations Stemming from Their Supply Chain

Cybersixgill, the global cyber threat intelligence data provider, broke new ground today by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security teams, enabling them to continuously monitor and detect risks to their environment arising from third-party suppliers and take preemptive action before an attack executes.

Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions.

New Research Shows a Continuing Increase in Ransomware Victims

GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals.

OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance.

Axis ­­Raises the Bar on Cybersecurity to Provide Wide-Ranging FIPS 140-Compliant Products to Government Customers

Axis Communications announces plans to expand the number of network physical security products certified to FIPS 140 under the Federal Information Processing Standards. This move will improve the cybersecurity postures of Axis customers that must meet the FIPS 140 certification, specifically in the government and critical infrastructure sectors.

i-PRO Advocates for Responsible AI Practices in Physical Security

i-PRO Co., Ltd. (formerly Panasonic Security), a global leader in professional security solutions for surveillance and public safety, underscores the critical importance of ethical and responsible AI practices in the physical security domain.

Versa Next Generation Firewall Achieves Recommended Rating and 99.90% Security Effectiveness Score from Independent Testing Lab

Versa Networks, provider of in AI/ML-powered Unified Secure Access Service Edge (SASE), today announced that Versa Next Generation Firewall (NGFW) received a Recommended Rating, the highest rating given by CyberRatings.org. In the Q1 2024 Cloud Network Firewall comparative report, Versa achieved an overall security effectiveness score of 99.90% with the fastest Rated Throughput of any vendor. As a result of CyberRatings’ rigorous testing of 11 cloud network firewall vendors, Versa NGFW once again demonstrated superior performance, security effectiveness, and value.

Graylog and SOC Prime Form Exclusive Partnership to Make Threat Detection and Response More Effective and Efficient

Graylog, a provider of in SIEM, Enterprise Log Management and API Security, together with SOC Prime, provider of the foremost platform for collective cyber defense, today unveiled their strategic technology partnership. Now available in beta, this collaboration promises to redefine the effectiveness and efficiency around how businesses identify and mitigate cyber threats.

Stop the Cybersecurity Blame Game

In December, genetic testing company 23andMe acknowledged a hack that led to the theft of nearly seven million customers’ data. As the New York Times reported, criminals obtained “ancestry trees, birth years and geographic locations.” This kind of digital theft may have felt personal to many of those impacted.

How to Roll Out Microsoft Copilot Securely and Ensure Data Security

Microsoft Copilot is a robust AI productivity tool integrated into Microsoft 365 applications. Copilot can significantly improve your daily workflows by assisting you with drafting documents and presentations, capturing action items in Teams meetings, analyzing data in Excel, and other tasks. However, adopting Copilot can also introduce unexpected data security risks because it is built on native access controls within Microsoft 365, meaning it can access all data a user has access to, including documents, emails, and notes. Therefore, it is crucial to prepare your organization for a secure Copilot rollout and ensure that your sensitive data remains under control in the future.

Security Industry Association Names Wayne Dorris as SIA Cybersecurity Advisory Board Chair

The Security Industry Association (SIA) has appointed Wayne Dorris of Axis Communications to serve as the new chair of SIA’s Cybersecurity Advisory Board.

Why The Human Problem In Cybersecurity Requires A More Humane Solution

People are the biggest vulnerability in cybersecurity. But are businesses doing enough to control and manage this risk? Short answer, no. Looking at cybersecurity spending it becomes evident that many strategies are focused on technological controls, as cybersecurity has traditionally been perceived solely as a technology-centric function. This mindset needs a reboot. People don’t make mistakes from lack of security technology investments; they err because, well, we’re human.

Study: Insider-Driven Data Loss Events Cost an Average of $15 Million Per Incident

Code42 Software recently released its annual Data Exposure Report (DER) for 2024, examining the intricacies of insider threats facing organizations today. The study found that data loss from insiders poses increased threats to security, further exacerbated by the introduction of AI and generative AI (GenAI) technology.

Boston Red Sox Choose Centripetal as Cyber Network Security Partner

Cybersecurity provider Centripetal recently announced that it has been selected as the Official Cyber Network Security Partner for the Boston Red Sox and Fenway Park. Under the multi-year partnership, Centripetal will protect the Boston Red Sox by deploying its CleanINTERNET solution at Fenway Park and their training facilities.

Report: GenAI Drives 1,760% Surge in Business Email Compromise Attacks

A report recently published by Perception Point, a provider of advanced email and workspace security solutions, has identified a 1,760% year-on-year increase in social engineering-based Business Email Compromise (BEC) attacks over the course of 2023.

City of Dallas Selects AI Cybersecurity Solution to Fortify Its Critical Infrastructure

MixMode, a provider of AI cybersecurity solutions for real-time detection and response, recently announced that the City of Dallas, Texas has entered into a partnership with MixMode, an advanced AI cybersecurity platform, to bolster their cybersecurity defenses.

Survey: Less Than Half of IT Leaders are Confident in their IoT Security Plans

Viakoo recently released findings from its 2024 IoT Security Crisis: By the Numbers. The survey uncovers insights from IT and security executives, exposes a dramatic surge in enterprise IoT security risks, and highlights a critical missing piece in the IoT security technology stack. The clarion call is clear: IT leaders urgently need to secure their IoT infrastructure one application at a time in an automated and expeditious fashion.

Cybersixgill Releases Annual State of the Underground Report, Revealing Dark Web Threat Actor Activities and Behaviors in 2023

Cybersixgill, cyber threat intelligence data provider, announced recently its newest report, State of the Underground 2024, which analyzes the company’s collected intelligence from the clear, deep, and dark web in 2023. The report features insights from the company’s threat intelligence experts into underground cybercriminal discourse, tactics, and behaviors, comparing them with trends and data from previous years and revealing the current state of threat actors’ activities and targets.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3