CyberSecurity


The Knowledge, Intention and Behavior Gap in Cybersecurity: How to Close It

While technology plays a crucial role in strengthening organizational defenses, it is not the sole solution to cybersecurity challenges. Cybercriminals understand that the easiest way to breach an organization, even those with top-notch security controls, is through exploiting the human element.



Survey: 56 Percent of IT Professionals Optimistic About Future of AI Threat Detection

OPSWAT recently published the results of its Threat Intelligence Survey. The comprehensive survey included insights from over 300 IT professionals responsible for malware detection, analysis, and response within their organizations, and provides valuable and surprising insights into the evolving threat intelligence landscape as well as the challenges IT professionals face today.

Preventing Cybersecurity Threats with Physical Security Entrances

Cyber security and physical security convergence is a hot topic amongst today’s security professionals and rightfully so.

Cloud Security Made Simple: A Beginner

Cloud Security Made Simple: A Beginner's Guide for Business Owners

Most businesses are familiar with the benefits of the cloud, especially when it comes to economies of scale, remote teams, and cost efficiency. However, companies just approaching or have recently completed the migration process often need to pay more attention to one of its most essential aspects—security.

Inside Out Defense Takes Aim

Inside Out Defense Takes Aim

Although the focus of the new SEC cyber rulings are publicly traded companies, most organizations are not prepared to comply with the new reporting guidelines. In the final rule, organizations will be required to disclose processes for assessing, identifying and managing material risks from cybersecurity threats. 

Cybersixgill Raises the Bar on Generative AI

Cybersixgill, a global cyber threat intelligence data provider, has announced new enhancements to Cybersixgill IQ, its generative AI solution launched less than two months ago.

Just Why Are So Many Cyber Breaches Due to Human Error?

Often mentioned but seldom probed in the media is the biggest reason behind cybersecurity breaches—employee error. Two facts about this stand out. One is just how overwhelming employee errors are. The other is that the fault lies largely in the lap of companies themselves, not their workers.

A Dose of AI

A Dose of AI

What is Artificial Intelligence? We’ve all heard the term, but what does it mean? For some it evokes imagery of a cinematic world’s end; for others, it is the Easy Button come to reality.

Report: 67 Percent of Businesses Lack Confidence of Full Recovery After Cyber Attack

New research commissioned by Cohesity reveals the majority of businesses do not have the necessary cyber resilience strategies or data security capabilities required to address today’s escalating cyber threats and maintain business continuity. Furthermore, their cyber resilience efforts are not keeping pace with cyber threats, with data security and recovery technology deficiencies reducing cyber insurance eligibility and increasing the fallout of a successful attack.

Cyber Threat Readiness Report Reveals Misalignment Between Execs, Security Analysts

Swimlane recently announced the release of the “2023 Cyber Threat Readiness Report” based on research conducted by Dimensional Research. The report reveals a lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to prevent business-ending breaches.

New Malware Discovered Targeting Small Office/Home Office Routers

New Malware Discovered Targeting Small Office/Home Office Routers

For the third time in the past year, Black Lotus Labs–the threat research arm of Lumen Technologies– has discovered a new malware that targets small office/home office (SOHO) routers.

Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

OPSWAT, a provider of critical infrastructure protection (CIP) cybersecurity solutions, recently released the findings of its 2023 State of Web Application Security report, based on an online survey of over 400 executive leaders, managers, and senior contributors. The survey provides a deep dive into the evolving state of web applications and cloud infrastructure and highlights a concerning disconnect.

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Pluralsight recently released its second annual State of Cloud Report, which compiles survey results from more than 1,000 technologists and leaders in the United States, Europe, Australia, and India on the most current trends and challenges in cloud strategy and learning. The study findings reveal a large multicloud skills gap, underscoring how critical cloud skills development is for organizations to ensure the multicloud reward outweighs the risk.

Envisioning the Future After Deploying SASE

Envisioning the Future After Deploying SASE

Secure Access Service Edge (SASE) converges networking functions and security tools into a unified cloud-based service delivered at each edge. It fundamentally transforms how organizations approach enterprise networking and cybersecurity. As with any transformative initiative, gaining leadership support can be the biggest challenge. CSOs and CISOs must look beyond the technical considerations to emphasize the strategic and financial value SASE provides.

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

Veza recently announced that City of Las Vegas has deployed Veza to secure access to sensitive data and critical infrastructure as it moves from a centralized, legacy infrastructure to a hybrid, multi-cloud environment.

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Keeper Security has recently released the results of its latest study, The Keeper Password Management Report: Unifying Perception with Reality. Assessing the password habits of over 8,000 individuals across the US, UK, France and Germany , the report reveals that 3 in 4 (75%) people globally don't adhere to widely-accepted password best practices, with a majority (64%) either using weak passwords or repeat variations of passwords to protect their online accounts.

MCi Protects its Customers Worldwide with Enterprise-grade Cyber Security

Serving state, local governments and global Fortune 100 companies in the energy, mining, manufacturing, and chemicals industries, Management Controls Inc. (MCi) needed to transform its cyber security to the world-class level expected by its long list of prestigious customers.

Survey: More Than 40% of IT Leaders Doubt Their Digital Infrastructure Is Prepared to Accommodate AI Tech

More than four in 10 IT leaders surveyed globally (42%) believe their existing IT infrastructure is not fully prepared for the demands of artificial intelligence (AI) technology, despite its widespread adoption across industries

Why Hackers Have Their Sights Set on Healthcare

Why Hackers Have Their Sights Set on Healthcare

We see it time and time again, the headlines splashed along newspapers and email newsletters that a hospital or its network of offices have been hit in a cybersecurity attack. Now more than ever, we continue to expect that attackers will target nursing homes, doctors’ offices, and other medical facilities due to the immense pressure the industry is facing to modernize. While the advancements in technology are vital to ensuring better patient care, they also open doors for threat actors everywhere.

The Need for a Comprehensive Strategy Addressing Cybersecurity and Quantum Technology

The Need for a Comprehensive Strategy Addressing Cybersecurity and Quantum Technology

Over the past two years, the Biden Administration has taken a series of steps centered on quantum and cybersecurity.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Making Safety and Security Intrinsic to School Design

    Public anxieties about school safety are escalating across the country. According to a 2023 Gallup report, 44% of parents fear for their child’s physical safety at school, a 10 percentage-point increase since 2019. Unfortunately, these fears are likely to increase if the incidence of school tragedies continues to mount. As a result, school leaders are now charged with two non-negotiable responsibilities. The first, as always, is to ensure kids have what they need to learn, grow, and thrive. Sadly, their second responsibility is to keep the children in their care safe from threats and physical danger. Read Now

  • The Power of a Layered Approach to Safety

    In a perfect world, every school would have an unlimited budget to help secure their schools. In reality, schools must prioritize what budget they have while navigating the complexities surrounding school security and lockdown. Read Now

  • How a Security System Can Enhance Arena Safety and the Fan Experience

    Ensuring guests have both a memorable experience and a safe one is no small feat for your physical security team. Stadiums, ballparks, arenas, and other large event venues are increasingly leveraging new technologies to transform the fan experience and maintain a high level of security. The goal is to preserve the integrity and excitement of the event while enhancing security and remaining “behind the scenes.” Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3