CyberSecurity


Russian Hackers Attempting to Use ChatGPT for Malicious Use

Russian Hackers Attempting to Use ChatGPT for Malicious Use

While OpenAI’s ChatGPT tool features a number of safeguards, that’s not stopping hackers from trying to make use of the tool for malicious intent.



ChatGPT Creates Polymorphic Malware

ChatGPT Creates Polymorphic Malware

The use of AI-assisted coding has the potential to revolutionize the way we develop software, but it also poses new risks to cybersecurity. It is important for organizations to understand the potential for malicious use of AI models and take proactive steps to mitigate these risks.

Darktrace Predicts Changing Role for CISO

Darktrace Predicts Changing Role for CISO

Looking forward, Darktrace is offering its 2023 Predictions, including where we can expect to see changes in MFA where accessibility and usability continue to dominate the discussion; continued Hactivism from non-state actors where ‘know thy enemy,

Is Your Security System Holding Back Your Organization’s Cloud Initiative?

Is Your Security System Holding Back Your Organization’s Cloud Initiative?

More organizations today are relying on cloud-based solutions to transform and grow their business than ever before. All major cloud service providers, including Google, Amazon, Microsoft and IBM, have seen astonishing growth in cloud-solution revenue over the last few years, and there is no slowdown in sight.

3 Security Trends Every CISO Needs to Know in 2023

3 Security Trends Every CISO Needs to Know in 2023

Cybersecurity has dominated the headlines in recent years as cyber attacks have risen at an increasingly alarming rate. In fact, global attacks increased by 28% in the third quarter of 2022 compared to the same period in 2021.

It is Time for Blockchain to Embrace the Level of Security Its Users Deserve

It is Time for Blockchain to Embrace the Level of Security Its Users Deserve

Blockchain technology was built in part on a principle of high-level security, but it is increasingly clear that this is not always the case, as noted by a recent DARPA analysis noting how cryptocurrency tech is vulnerable to tampering.

Proactive Cybersecurity: Increased Safety Measures Make All the Difference

The infrastructure of the United States is under attack, as foreign criminals use advanced skills and exploit company vulnerabilities to cripple operations, disrupt industrial control systems, and ultimately inflict significant damage, both monetarily and economically.

Predicting the Cybersecurity Future

Predicting the Cybersecurity Future

Wouldn’t it be nice to have a crystal ball to understand exactly what we can expect in 2023 from the Cybersecurity world?

Constantly Evolving

Constantly Evolving

Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.

Is your access control system cyber secure?

Is Your Access Control System Cyber Secure?

Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.

Fortanix Expands Relationship with AWS, Fortanix Data Security Manager Works with the AWS KMS External Key Store

Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.

Debunking the Misconceptions of Open Source Security Platforms

The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.

Predicting the Cyber Future

Predicting the Cyber Future

A look ahead to 2023 we can expect to see changes in MFA, continued Hactivism from non-state actors, CISOs lean in on more proactive security and crypto-jackers will get more perceptive.

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Vulcan Cyber, developers of the unified cyber risk and security posture management platform, recently announced the latest results of its ongoing research into vulnerability risk management initiatives and risk impact on business operations. The survey finds 75% of organizations have dedicated threat intelligence teams and two-thirds have dedicated threat intelligence budgets

Research: One-Third of Organizations Forced to Change Leadership as a Result of a Cyberattack

Research: One-Third of Organizations Forced to Change Leadership as a Result of a Cyberattack

IT and security leaders must address, on average, one cyberattack per week according to a new study released titled “The State of Data Security” by Rubrik Zero Labs. Rubrik, the Zero Trust Data Security Company, commissioned a study from Wakefield Research to gather insights from more than 1,600 security and IT leaders including CISOs, CIOs, VPs, and Directors across 10 countries.

Securing Overlooked IoT Devices from Cyber Criminals

Securing Overlooked IoT Devices from Cyber Criminals

When it comes to cybersecurity, many organizations overlook IoT devices; but it is imperative that they are given equal consideration, as these devices are connected to the internet (i.e. printers, security cameras and smart home hubs) and can serve as an open door for cyber criminals.

Report: Ransomware Attacks Trending Down in the United States

Report: Ransomware Attacks Trending Down in the United States

SonicWall recently released new threat data through the third quarter of 2022. SonicWall recorded more than 4 billion malware attempts globally while year-to-date ransomware attempts in 2022 have already exceeded full-year totals from four of the last five years. In the recent 2022 SonicWall Cyber Threat Mindset Survey, 91% of organizations reported that they are most concerned about ransomware attacks, indicating a rise of anxiety among security professionals.

Top 5 Cloud Data Security Best Practices for Cyber Awareness Month and How to Get There

Top 5 Cloud Data Security Best Practices for Cyber Awareness Month and How to Get There

Cloud data security is a serious challenge most organizations face today. The cloud was designed for collaboration where every file or data element can be shared with anyone halfway around the globe. Cloud data can also be copied, duplicated, modified and passed along very easily. To illustrate the challenge, think about 100 different variations of a redlined sensitive contract that need to be protected, and consider that each variant can have different access privileges.

Research: Cybersecurity Remains Top Concern for Physical Security Professionals

Research: Cybersecurity Remains Top Concern for Physical Security Professionals

As cybersecurity awareness month continues to be a focus of discussion in October, new research conducted by Genetec, technology provider of unified security, public safety, operations, and business intelligence solutions, shows that cybersecurity remains a top concern for physical security professionals going into 2023.

It is Time to Think about Cyber Awareness

Cyber Awareness Month is upon us and we want to share some of our best practices for what organizations can do to enhance their security posture while remaining vigilant to stay ahead of threats as best they can.

Featured

  • Survey Shows Election Anxiety Crosses Party Lines

    New reports of election worker intimidation are raising concerns about election interference. A majority of Americans (71%) are worried about voter intimidation or safety at the polls, and 75% want security cameras at their voting place, according to a new national survey. Read Now

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3