CyberSecurity


K2 Names Thunell as Cybersecurity Executive Vice President

Chris Thunell joins K2 to lead enterprise IT strategy and federal compliance initiatives across the defense and security sectors.



AWS Security Hub Adds Full Stack Partner Solutions

The new Extended plan allows organizations to integrate and manage third-party security tools for endpoint, identity, and network protection.

System Surveyor Launches Integration Marketplace

New platform expansion enables security integrators to synchronize site surveys with CRM and ERP software, streamlining project lifecycles.

SIA Names Erica McCann Chair of Government Relations Committee

McCann will lead the Security Industry Association’s primary bipartisan body for federal and state legislative advocacy and policy development.

Hacker and system warning

AI Arms Race Accelerates as Cyber Breakout Times Drop to Seconds

New threat data reveals eCrime breakout times have plummeted to 29 minutes as adversaries weaponize AI to automate intrusions and data theft.

Unapplied Patches Drive Majority of Open Source Breaches

New report finds security incidents are a "routine reality" for nearly half of organizations using open-source software in production.

Cyber Security Graphic

Axis Achieves SOC 2 Type 2 Attestation for Cloud Security Platform

Axis Communications has achieved SOC 2 Type 2 attestation, validating the long-term effectiveness of cybersecurity and operational controls across its Axis Cloud Connect platform and cloud-enabled physical security solutions.

Security Today Announces 2025 CyberSecured Award Winners

Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today.

Security Industry Association Launches Data Center Advisory Board

The Security Industry Association (SIA) has launched the Data Center Advisory Board, a panel of experts that will provide guidance on data center security topics to the SIA Board of Directors and related resources to SIA members. Jim Black, senior director and security architect at Microsoft, has been named chair of the group.

Axis Signs CISA’s Secure by Design Pledge for Cybersecurity

Axis Communications, a global industry leader in video surveillance, announces it has signed the U.S. Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge to transparently communicate about the cybersecurity posture of Axis products.

Viakoo Funds Scholarship at University of Nevada, Reno to Support Cyber Defense Focus

Viakoo, a leader in vulnerability remediation for IoT, OT, and CPS systems today announced the establishment of the “Cyber Defense Leadership” scholarship at the University of Nevada, Reno. This new program will provide $10,000 to fund an annual scholarship to recognize and nurture the next generation of cybersecurity talent and leadership at the University. With the emergence of new types of threat vectors, including AI-driven threats, more focus on creating next generation security solutions is urgently needed.

Ransomware Attacks Rise for the First Time in Six Months

Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals.

Identity Governance at the Crossroads of Complexity and Scale

Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise.

Report: AI is Supercharging Old-School Cybercriminal Tactics

AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic.

Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk.

The Impact of Convergence Between IT and Physical Security

For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos.

Survey: Nearly Half of Employees Hide Workplace AI Use

Laserfiche, a SaaS provider of intelligent content management and business process automation, recently released new survey findings on AI adoption in the workplace, revealing that nearly half of Americans (49%) who use AI at work keep it to themselves, with 15% deliberately avoiding telling their manager.

46% of Enterprise Passwords Are Vulnerable to Cracking

Picus Security recently released The Blue Report™ 2025, based on more than 160 million real-world attack simulations. Now in its third year, the report provides a data-driven assessment of how well security controls perform against today’s threats — and this year’s findings are the most concerning to date.

Browser-Based AI Agents: The Silent Security Threat Unfolding

Some of the most revolutionary advances in artificial intelligence include browser-based AI agents, which are self-sustaining software tools integrated into web browsers that act on behalf of individuals.

Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year.

Featured

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.