CyberSecurity


AlertEnterprise Selected by GRC Outlook as One of the Top GRC Solution Providers in 2023

AlertEnterprise, the only provider of three dimensional governance, risk, and compliance (GRC) solutions, has been recognized by GRC Outlook as one of the Top 10 GRC solution providers in 2023.



The Knowledge, Intention and Behavior Gap in Cybersecurity: How to Close It

While technology plays a crucial role in strengthening organizational defenses, it is not the sole solution to cybersecurity challenges. Cybercriminals understand that the easiest way to breach an organization, even those with top-notch security controls, is through exploiting the human element.

Survey: 56 Percent of IT Professionals Optimistic About Future of AI Threat Detection

OPSWAT recently published the results of its Threat Intelligence Survey. The comprehensive survey included insights from over 300 IT professionals responsible for malware detection, analysis, and response within their organizations, and provides valuable and surprising insights into the evolving threat intelligence landscape as well as the challenges IT professionals face today.

Preventing Cybersecurity Threats with Physical Security Entrances

Cyber security and physical security convergence is a hot topic amongst today’s security professionals and rightfully so.

Cloud Security Made Simple: A Beginner

Cloud Security Made Simple: A Beginner's Guide for Business Owners

Most businesses are familiar with the benefits of the cloud, especially when it comes to economies of scale, remote teams, and cost efficiency. However, companies just approaching or have recently completed the migration process often need to pay more attention to one of its most essential aspects—security.

Inside Out Defense Takes Aim

Inside Out Defense Takes Aim

Although the focus of the new SEC cyber rulings are publicly traded companies, most organizations are not prepared to comply with the new reporting guidelines. In the final rule, organizations will be required to disclose processes for assessing, identifying and managing material risks from cybersecurity threats. 

Cybersixgill Raises the Bar on Generative AI

Cybersixgill, a global cyber threat intelligence data provider, has announced new enhancements to Cybersixgill IQ, its generative AI solution launched less than two months ago.

Just Why Are So Many Cyber Breaches Due to Human Error?

Often mentioned but seldom probed in the media is the biggest reason behind cybersecurity breaches—employee error. Two facts about this stand out. One is just how overwhelming employee errors are. The other is that the fault lies largely in the lap of companies themselves, not their workers.

A Dose of AI

A Dose of AI

What is Artificial Intelligence? We’ve all heard the term, but what does it mean? For some it evokes imagery of a cinematic world’s end; for others, it is the Easy Button come to reality.

Report: 67 Percent of Businesses Lack Confidence of Full Recovery After Cyber Attack

New research commissioned by Cohesity reveals the majority of businesses do not have the necessary cyber resilience strategies or data security capabilities required to address today’s escalating cyber threats and maintain business continuity. Furthermore, their cyber resilience efforts are not keeping pace with cyber threats, with data security and recovery technology deficiencies reducing cyber insurance eligibility and increasing the fallout of a successful attack.

Cyber Threat Readiness Report Reveals Misalignment Between Execs, Security Analysts

Swimlane recently announced the release of the “2023 Cyber Threat Readiness Report” based on research conducted by Dimensional Research. The report reveals a lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to prevent business-ending breaches.

New Malware Discovered Targeting Small Office/Home Office Routers

New Malware Discovered Targeting Small Office/Home Office Routers

For the third time in the past year, Black Lotus Labs–the threat research arm of Lumen Technologies– has discovered a new malware that targets small office/home office (SOHO) routers.

Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

OPSWAT, a provider of critical infrastructure protection (CIP) cybersecurity solutions, recently released the findings of its 2023 State of Web Application Security report, based on an online survey of over 400 executive leaders, managers, and senior contributors. The survey provides a deep dive into the evolving state of web applications and cloud infrastructure and highlights a concerning disconnect.

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Pluralsight recently released its second annual State of Cloud Report, which compiles survey results from more than 1,000 technologists and leaders in the United States, Europe, Australia, and India on the most current trends and challenges in cloud strategy and learning. The study findings reveal a large multicloud skills gap, underscoring how critical cloud skills development is for organizations to ensure the multicloud reward outweighs the risk.

Envisioning the Future After Deploying SASE

Envisioning the Future After Deploying SASE

Secure Access Service Edge (SASE) converges networking functions and security tools into a unified cloud-based service delivered at each edge. It fundamentally transforms how organizations approach enterprise networking and cybersecurity. As with any transformative initiative, gaining leadership support can be the biggest challenge. CSOs and CISOs must look beyond the technical considerations to emphasize the strategic and financial value SASE provides.

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

Veza recently announced that City of Las Vegas has deployed Veza to secure access to sensitive data and critical infrastructure as it moves from a centralized, legacy infrastructure to a hybrid, multi-cloud environment.

Winter is coming - is Your Access Management Process Recession-proof?

Last year, we survived the summer of ransomware and faced a potential global recession, higher inflation and geopolitical tension - a wobbly energy market and rising interest rates. The million-dollar question is what the state of an exhausted workforce means to cyber security, especially as recessions bring a high turnover rate.

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Keeper Security has recently released the results of its latest study, The Keeper Password Management Report: Unifying Perception with Reality. Assessing the password habits of over 8,000 individuals across the US, UK, France and Germany , the report reveals that 3 in 4 (75%) people globally don't adhere to widely-accepted password best practices, with a majority (64%) either using weak passwords or repeat variations of passwords to protect their online accounts.

MCi Protects its Customers Worldwide with Enterprise-grade Cyber Security

Serving state, local governments and global Fortune 100 companies in the energy, mining, manufacturing, and chemicals industries, Management Controls Inc. (MCi) needed to transform its cyber security to the world-class level expected by its long list of prestigious customers.

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Nearly three-quarters of all cyberattacks involve ransomware which means a majority of defenders are failing to detect ransomware successfully. The fact is, ransomware isn’t the first stage of the attack, it’s often the last stage; and cyberattacks usually get labeled or categorized as ransomware when data is encrypted or stolen and a ransom is demanded by cybercriminals.

Featured

  • Survey Shows Election Anxiety Crosses Party Lines

    New reports of election worker intimidation are raising concerns about election interference. A majority of Americans (71%) are worried about voter intimidation or safety at the polls, and 75% want security cameras at their voting place, according to a new national survey. Read Now

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3