CyberSecurity


DHS Announces New Artificial Intelligence Task Force

DHS Announces New Artificial Intelligence Task Force

Secretary of Homeland Security Alejandro N. Mayorkas recently announced two new initiatives to combat evolving threats during his first address on the State of the Homeland Security.



New Research Shows Ransomware Attacks Resurge with Victims Doubling in 2023

New Research Shows Ransomware Attacks Resurge with Victims Doubling in 2023

Black Kite, provider third-party cyber risk intelligence, recently released its highly anticipated report, “Ransomware Threat Landscape 2023: Ransomware Resurgence”.

Quorum Cyber Sets Sights on North America

UK-based cybersecurity firm Quorum Cyber has announced its intention to focus on the North American market after achieving impressive year-over-year growth.

Sotero Introduces Ransomware Protection Technology

In advance of RSAC 2023, Sotero has announced the availability of Sotero Ransomware Protection, giving organizations the ability to proactively protect unstructured data from attack by using behavior-based detection.

Darktrace - Generative AI Changes Everything You Know About Email Cyber Attacks

Darktrace - Generative AI Changes Everything You Know About Email Cyber Attacks

In new data published today, Darktrace reveals that email security solutions, including native, cloud, and ‘static AI’ tools, take an average of thirteen days from an attack being launched on a victim to that attack being detected, leaving defenders vulnerable for almost two weeks if they rely solely on these tools.

The Core Value Proposition

The Core Value Proposition

Machine and deep learning algorithms are everywhere in our lives. Masquerading as AI, they are only in their infancy. Have a conversation with a ChatGPT chatbot, and it becomes clear just how far we have come in a short time and how far we have to go.

Purpose-built AI for security cameras

In recent years, there has been a significant increase in companies introducing AI technologies for the security surveillance industry. All are promising the ability to deliver some new capability or a better “mousetrap.”

On Notice: Proactively Mitigating Cyber Vulnerabilities

We all continue to see common themes across the headlines: Economic downturn, cross-industry job cuts and global geopolitical uncertainty. For businesses around the world, the turbulent situation can create unintended gaps in critical systems or processes that are core to operations.

Cyber Hygiene: What it Looks Like for IoT Devices

Cyber Hygiene: What it Looks Like for IoT Devices

For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices.

Optiv Doubles Federal Presence with ClearShark Acquisition

Optiv, the cyber advisory and solutions leader, today announced it has acquired Maryland-based ClearShark LLC and ClearShark Services Inc. (collectively ClearShark), a premier advisor and top value-added reseller of cybersecurity and modernization technology to the federal government.

IoT Cybersecurity Pillars – Four Core Tenets of Any IoT Security Program

IoT Cybersecurity Pillars – Four Core Tenets of Any IoT Security Program

The world has seen a significant increase in cyber-attacks aimed at critical infrastructure and security products in the last few years, with Industrial Internet of Things (IIoT) devices such as security cameras, becoming prime targets for hackers.

EPA Emphasizes Need for Cybersecurity Resilience of Public Water Systems

EPA Emphasizes Need for Cybersecurity Resilience of Public Water Systems

The U.S. Environmental Protection Agency (EPA) recently released a memorandum stressing the need for states to assess cybersecurity risk at drinking water systems to protect our public drinking water.

Report: Sensitive Data Sharing Increases 60 Percent Over the Past Year

Report: Sensitive Data Sharing Increases 60 Percent Over the Past Year

Concentric AI, a vendor of intelligent AI-based solutions for autonomous data security posture management (DSPM), recently announced the availability of its 2022 Data Risk Report, which highlights a continued rise in oversharing of business-critical and sensitive documents. The report revealed the number of overshared files rose 60 percent in 2022 compared to 2021, highlighting the significant impact of hybrid remote work, cloud migration and information sprawl across on-premises and cloud data, as well as email and messaging environments, on data security

NSA Releasees Best Practices for Securing Your Home Network

NSA Releases Best Practices for Securing Your Home Network

The National Security Agency (NSA) released a list of cybersecurity best practices. The information sheet was designed to help teleworkers protect their home networks from malicious cyber actors.

Darktrace Newsroom Capability Shortens Time from News Headline to Cyber Security Action

Darktrace today announces the general availability of Darktrace NewsroomTM, an AI-driven system that continuously monitors open-source intelligence sources for new critical vulnerabilities and assesses each organization’s exposure through its in-depth knowledge of their unique external attack surface.

Malicious DDoS Attacks Rise 150% in 2022 According to New Report

Radware, a provider of cyber security and application delivery solutions, released its 2022 Global Threat Analysis Report. The full-year report leverages intelligence provided by network and application attack activity sourced from Radware’s Cloud and Managed Services, Global Deception Network and threat research team.

See How Reddit Users Have Unlocked the Dark Side of ChatGPT

See How Reddit Users Have Unlocked the Dark Side of ChatGPT

In less than four months after its debut, ChatGPT continues to garner attention from users all around the world who have made use of the AI system that answers questions, creates computer code, and much more.

Enforcing Zero Trust in a Hybrid Work Environment

Enforcing Zero Trust in a Hybrid Work Environment

The effects of the pandemic have rippled across the business world like a meteor hitting a pond, creating a new plethora of challenges that incorporated into MBA curriculum for years to come.

CTM360 Recognized as a Global Leader in Digital Risk Protection (DRP) Enabling Technology by Frost & Sullivan

CTM360, the first Arab world cybersecurity technology operating at a global scale, has captured the Frost & Sullivan 2022 Global Digital Risk Protection Enabling Technology Leadership Award for excellence in commercialization success, application diversity, commitment to creativity and customer service experience.

Report: More Than Half of Organizations Have Experienced an Insider Threat in the Past Year

Report: More Than Half of Organizations Have Experienced an Insider Threat in the Past Year

Gurucul, a provider of solutions in the Next Generation SIEM market, and Cybersecurity Insiders, a 600,000+ member online community for information security professionals, recently released its annual 2023 Insider Threat Report. Overall, results indicate insider threats are a top concern at organizations of all kinds; only 3% of respondents surveyed are not concerned with insider risk.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.