CyberSecurity


NSC, CISA Highlight Top Cyber Misconfigurations

NSC, CISA Highlight Top Cyber Misconfigurations

Damaging cyber intrusions are far too common, causing harm to public and private organizations across every sector. While some of these intrusions use novel methods to gain access or move across a network, many exploit common misconfigurations. By ensuring strong configurations, we can significantly reduce the prevalence and impact of cyber-attacks.



CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

The Cybersecurity and Infrastructure Security Agency (CISA) recently announced the kickoff of the 20th Cybersecurity Awareness Month. Throughout October, CISA and the National Cybersecurity Alliance (NCA) will focus on ways to “Secure Our World” by educating the public on how to stay safe online.

Banking on the Cloud

Banking on the Cloud

Walk the GSX or ISC West show floor and you will see ample evidence that cloud has arrived. Cloud (and cloud-like) video surveillance providers are entering the market and exhibiting at trade shows.

Will AI Rid The Need For Cybersecurity Experts And Service Providers?

Will AI Rid The Need For Cybersecurity Experts And Service Providers?

When mechanized looms were first introduced, workers protested because they feared the automation would rob them of their skilled craft. When ATMs first arrived, some foretold the demise of bank tellers. When self-service kiosks were introduced, everyone believed they would replace cashiers. While technological shifts may have caused job losses in certain sectors, it could be argued that automation simply transformed the nature of work, or altered the responsibilities of workers instead of eliminating jobs. In fact, history shows that societal changes due to advances in technology have created more jobs than not.

12 Commercial Crime Sites to Do Your Research

12 Commercial Crime Sites to Do Your Research

Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust?

Report: DDoS Attacks Up 200 Percent in First Half of 2023

Zayo Group Holdings Inc. recenrly announced its annual Distributed Denial of Service (DDoS) Insights Report, analyzing DDoS attack activity and impact across industries in the first half of 2023.

The Benefits of OT, IT Collaboration

The Benefits of OT, IT Collaboration

It is no secret: OT and IT are converging. Physical security devices that were previously air gapped or standalone are now connected to a network, and with physical security devices more affordable than ever, the number of connected devices continues to grow. However, just because the technology itself is converging, that does not mean the human side of OT and IT are following suit.

AlertEnterprise Selected by GRC Outlook as One of the Top GRC Solution Providers in 2023

AlertEnterprise, the only provider of three dimensional governance, risk, and compliance (GRC) solutions, has been recognized by GRC Outlook as one of the Top 10 GRC solution providers in 2023.

The Knowledge, Intention and Behavior Gap in Cybersecurity: How to Close It

While technology plays a crucial role in strengthening organizational defenses, it is not the sole solution to cybersecurity challenges. Cybercriminals understand that the easiest way to breach an organization, even those with top-notch security controls, is through exploiting the human element.

Survey: 56 Percent of IT Professionals Optimistic About Future of AI Threat Detection

OPSWAT recently published the results of its Threat Intelligence Survey. The comprehensive survey included insights from over 300 IT professionals responsible for malware detection, analysis, and response within their organizations, and provides valuable and surprising insights into the evolving threat intelligence landscape as well as the challenges IT professionals face today.

Preventing Cybersecurity Threats with Physical Security Entrances

Cyber security and physical security convergence is a hot topic amongst today’s security professionals and rightfully so.

Cloud Security Made Simple: A Beginner

Cloud Security Made Simple: A Beginner's Guide for Business Owners

Most businesses are familiar with the benefits of the cloud, especially when it comes to economies of scale, remote teams, and cost efficiency. However, companies just approaching or have recently completed the migration process often need to pay more attention to one of its most essential aspects—security.

Inside Out Defense Takes Aim

Inside Out Defense Takes Aim

Although the focus of the new SEC cyber rulings are publicly traded companies, most organizations are not prepared to comply with the new reporting guidelines. In the final rule, organizations will be required to disclose processes for assessing, identifying and managing material risks from cybersecurity threats. 

Cybersixgill Raises the Bar on Generative AI

Cybersixgill, a global cyber threat intelligence data provider, has announced new enhancements to Cybersixgill IQ, its generative AI solution launched less than two months ago.

Just Why Are So Many Cyber Breaches Due to Human Error?

Often mentioned but seldom probed in the media is the biggest reason behind cybersecurity breaches—employee error. Two facts about this stand out. One is just how overwhelming employee errors are. The other is that the fault lies largely in the lap of companies themselves, not their workers.

A Dose of AI

A Dose of AI

What is Artificial Intelligence? We’ve all heard the term, but what does it mean? For some it evokes imagery of a cinematic world’s end; for others, it is the Easy Button come to reality.

Report: 67 Percent of Businesses Lack Confidence of Full Recovery After Cyber Attack

New research commissioned by Cohesity reveals the majority of businesses do not have the necessary cyber resilience strategies or data security capabilities required to address today’s escalating cyber threats and maintain business continuity. Furthermore, their cyber resilience efforts are not keeping pace with cyber threats, with data security and recovery technology deficiencies reducing cyber insurance eligibility and increasing the fallout of a successful attack.

Cyber Threat Readiness Report Reveals Misalignment Between Execs, Security Analysts

Swimlane recently announced the release of the “2023 Cyber Threat Readiness Report” based on research conducted by Dimensional Research. The report reveals a lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to prevent business-ending breaches.

New Malware Discovered Targeting Small Office/Home Office Routers

New Malware Discovered Targeting Small Office/Home Office Routers

For the third time in the past year, Black Lotus Labs–the threat research arm of Lumen Technologies– has discovered a new malware that targets small office/home office (SOHO) routers.

Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

OPSWAT, a provider of critical infrastructure protection (CIP) cybersecurity solutions, recently released the findings of its 2023 State of Web Application Security report, based on an online survey of over 400 executive leaders, managers, and senior contributors. The survey provides a deep dive into the evolving state of web applications and cloud infrastructure and highlights a concerning disconnect.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities