CyberSecurity


Haystack Solutions’ Cyber Aptitude and Talent Assessment (CATA) Reveals Latent Cyber Genius Potential

Haystack Solutions’ new Cyber Aptitude and Talent Assessment (CATA) has been shown in tests conducted at the University of Maryland’s (UMD) Applied Research Laboratory for Intelligence and Security (ARLIS) Center to provide cybersecurity aptitude assessments that predict candidate success with uncanny precision.



NIST Releases Tips and Tactics for Dealing With Ransomware

NIST Releases Tips and Tactics for Dealing With Ransomware

Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access.

How a Culture of Identity Governance Drives Success in Digital Transformation

Digital Transformation (DX) should be an important area of strategic focus for companies that want to grow and thrive in a changing world.

Versa Networks Secures 84M in Series D Funding to Accelerate SASE Growth

Versa Networks has announced that it has raised $84 million in a Series D funding round, bringing the company’s total amount raised in funding to $196 million.

SBrinqa Accelerates Adoption of Risk-based Cybersecurity with First Institutional Investment of $110M

Brinqa Accelerates Adoption of Risk-based Cybersecurity with First Institutional Investment of $110M

Brinqa™ is a global leader in Cyber Risk Management. The company’s applications leverage the industry's only Knowledge Graph for cybersecurity – The Cyber Risk Graph.

Minerva Prevents an XtremeRat Attack

One of Minvera Labs’ clients, a midsize critical infrastructure organization, was almost disabled or worse, because of an innocent mistake made by one of their employees.

Always Surrounded

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.

DHS Announces New Cybersecurity Requirements for Critical Pipeline Owners and Operators

DHS Announces New Cybersecurity Requirements for Critical Pipeline Owners and Operators

The Department of Homeland Security’s Transportation Security Administration (TSA) announced a Security Directive that will enable the department to better identify, protect against and respond to threats to critical companies in the pipeline sector.

70 Percent Of SOC, IT Security Teams Emotionally Overwhelmed By Security Alert Volume

Trend Micro Incorporated recently released results from a new study that reveals SOC and IT security teams are suffering from high levels of stress outside of the working day—with alert overload a prime culprit.

New Fingerprint Technology Can Detect Cocaine Use

New Fingerprint Technology Can Detect Cocaine Use

Dr. Melanie Bailey is a fellow of the Engineering and Physical Sciences Research Council (EPSRC). Her team has identified differences between the fingerprints of people who touched cocaine compared with those who have ingested the drug, even if the hands are not washed.

Technology counts on AI to authenticate and identify people

Always Surrounded

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.

DoD Needs to Invest More in Innovation

Numerous commissions, studies and papers continue to point to the stifling effects of the DoD procurement system on production, efficiency, and innovation as well as lead to bloated price tags like the F-35.

Lessons Learned from Oldsmar Water Plant Hack

Lessons Learned from Oldsmar Water Plant Hack

Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.

Actionable Intelligence

There is no doubt that Artificial Intelligence (AI) is here to stay, as new AI-driven solutions are pervasive across every category of professional and consumer electronics today.

Current and future uses in the commercial security industry

On a Cloud of its Own

Cloud-based technology and solutions have become more and more mainstream, especially in the commercial security industry.

Data Theorem Launches Industry’s First App-Aware Full Stack Cloud Security Product

Data Theorem Inc., today introduced the industry’s first application-aware full stack cloud security product with attack surface management (ASM) for protecting data in cloud-native apps, API services and serverless cloud functions.

Transforming the Industry

Transforming the Industry

Artificial Intelligence (AI) continues to gain momentum every day, and it is already poised to augment and enrich many aspects of our business and personal lives.

Passing Prop 24

Passing Prop 24

Supporters of Prop. 24 posited the CCPA privacy law, even though it had just gone into effect earlier in the year, wasn’t strong enough.

Learn to Walk Before Running

Learn to Walk Before Running

Today’s analytics are not only better able to differentiate between true security incidents and false alarms, but can be programmed to trigger when a given event occurs.

Biden Signs Executive Order calling for Semiconductor Supply Chain Review

Biden Signs Executive Order calling for Semiconductor Supply Chain Review

President Biden has signed another executive order addressing growing concern over a global semiconductor shortage.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3