CyberSecurity


Panther Unveils Security Data Lake Search and Splunk Integration to Redefine Detection and Response at Scale

Panther Labs, a cybersecurity innovator for detection and response at scale, today announced the launch of its new Security Data Lake Search and Splunk Integration capabilities. These offerings mark a critical leap forward in managing security risks in today’s cloud-first landscape.



Cybersixgill Unveils Identity Intel Model for Threat Intelligence

Cybersixgill, a cyber threat intelligence data provider, announced today new features and capabilities that take security teams’ threat detection and mitigation efforts to new levels, helping them identify and mitigate vulnerabilities and detect and stop threats more quickly and effectively than ever before.

Free Cybersecurity Certificate Series Help Organizations and Individuals Protect from Cyber Attacks

With the growing frequency, sophistication and magnitude of cyberattacks around the world, the Texas A&M Engineering Extension Service (TEEX) has established a new cybersecurity certificate series to help the public and private sector protect their organizations and data.

Interface Systems Appoints New Leaders to its Executive Team

Interface Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, today announced that Sean Foley has been appointed to the role of chief revenue officer and Sunita Mani to the role of chief marketing officer.

What the New SEC Cybersecurity Rules Mean for Tech Companies

On July 26, the US Securities & Exchange Commission (SEC) released a new rule aimed to increase consistency of how and when material cybersecurity information is disclosed to investors and the public. The rule became effective Sept 5, 2023.

Five Cybersecurity Trends Predictions for 2024

According to Cybersixgill, threat research experts, AI’s evolution will continually improve both organizations’ cyber defense efforts and cybercriminal activities. At the same time, increasingly complex regulatory requirements, continued consolidation of cybersecurity tools, a widening attack surface, and heightened global geopolitical issues will all play a significant role in driving the direction of cybersecurity.

NSA Report Focuses on How to Protect Against Evolving Phishing Attacks

The National Security Agency (NSA) and U.S. partners have released a new report describing the latest techniques in phishing attacks and the defenses organizations can deploy against them.

Report Shows 1,265 Percent Increase in Phishing Emails Since ChatGPT Launch

SlashNext, provider of SaaS-based Integrated Cloud Messaging Security across email, web, and mobile, today released the SlashNext State of Phishing Report for 2023.

MEF’s Inaugural Global Network-as-a-Service Event: Accelerating NaaS Innovation and Security Certification

Earlier this month, MEF, a global industry association of network, cloud, security and technology providers, hosted its first annual Global Network-as-a-Service Event (GNE). The goal of GNE was to bring together top executives from the emerging NaaS (Network-as-a-Service) ecosystem to discuss the latest trends and technologies to help companies achieve their digital transformation goals.

Research Reveals Nearly Half of Organizations Underestimate Risk Level

Veritas Technologies, a provider of secure multi-cloud data management, recently released findings of new research that shows 45% of organizations may be miscalculating the severity of threats to their business. The study, Data Risk Management: The State of the Market—Cyber to Compliance, which polled 1,600 executives and IT practitioners across 13 global markets, provides insights into the most pressing risks, their impacts and how organizations plan to navigate them.

Protecting Cloud Apps Common in Healthcare with API Security

Protecting Cloud Apps Common in Healthcare with API Security

Many healthcare information systems (HIS) applications rely on APIs to exchange data and interact with external systems. With the increasing adoption of cloud computing, the usage of APIs has grown exponentially in healthcare

CISO Global Listed on PCI Marketplace as Qualified Security Assessor

CISO Global, an industry leader as a managed cybersecurity and compliance provider, has been added to the PCI Marketplace as a PCI Quality Security Assessor (QSA).

NSC, CISA Highlight Top Cyber Misconfigurations

NSC, CISA Highlight Top Cyber Misconfigurations

Damaging cyber intrusions are far too common, causing harm to public and private organizations across every sector. While some of these intrusions use novel methods to gain access or move across a network, many exploit common misconfigurations. By ensuring strong configurations, we can significantly reduce the prevalence and impact of cyber-attacks.

CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

The Cybersecurity and Infrastructure Security Agency (CISA) recently announced the kickoff of the 20th Cybersecurity Awareness Month. Throughout October, CISA and the National Cybersecurity Alliance (NCA) will focus on ways to “Secure Our World” by educating the public on how to stay safe online.

Report: DDoS Attacks Up 200 Percent in First Half of 2023

Zayo Group Holdings Inc. recenrly announced its annual Distributed Denial of Service (DDoS) Insights Report, analyzing DDoS attack activity and impact across industries in the first half of 2023.

The Benefits of OT, IT Collaboration

The Benefits of OT, IT Collaboration

It is no secret: OT and IT are converging. Physical security devices that were previously air gapped or standalone are now connected to a network, and with physical security devices more affordable than ever, the number of connected devices continues to grow. However, just because the technology itself is converging, that does not mean the human side of OT and IT are following suit.

AlertEnterprise Selected by GRC Outlook as One of the Top GRC Solution Providers in 2023

AlertEnterprise, the only provider of three dimensional governance, risk, and compliance (GRC) solutions, has been recognized by GRC Outlook as one of the Top 10 GRC solution providers in 2023.

The Knowledge, Intention and Behavior Gap in Cybersecurity: How to Close It

While technology plays a crucial role in strengthening organizational defenses, it is not the sole solution to cybersecurity challenges. Cybercriminals understand that the easiest way to breach an organization, even those with top-notch security controls, is through exploiting the human element.

Survey: 56 Percent of IT Professionals Optimistic About Future of AI Threat Detection

OPSWAT recently published the results of its Threat Intelligence Survey. The comprehensive survey included insights from over 300 IT professionals responsible for malware detection, analysis, and response within their organizations, and provides valuable and surprising insights into the evolving threat intelligence landscape as well as the challenges IT professionals face today.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3