CyberSecurity


Russian Hackers Attempting to Use ChatGPT for Malicious Use

Russian Hackers Attempting to Use ChatGPT for Malicious Use

While OpenAI’s ChatGPT tool features a number of safeguards, that’s not stopping hackers from trying to make use of the tool for malicious intent.



ChatGPT Creates Polymorphic Malware

ChatGPT Creates Polymorphic Malware

The use of AI-assisted coding has the potential to revolutionize the way we develop software, but it also poses new risks to cybersecurity. It is important for organizations to understand the potential for malicious use of AI models and take proactive steps to mitigate these risks.

Darktrace Predicts Changing Role for CISO

Darktrace Predicts Changing Role for CISO

Looking forward, Darktrace is offering its 2023 Predictions, including where we can expect to see changes in MFA where accessibility and usability continue to dominate the discussion; continued Hactivism from non-state actors where ‘know thy enemy,

Is Your Security System Holding Back Your Organization’s Cloud Initiative?

Is Your Security System Holding Back Your Organization’s Cloud Initiative?

More organizations today are relying on cloud-based solutions to transform and grow their business than ever before. All major cloud service providers, including Google, Amazon, Microsoft and IBM, have seen astonishing growth in cloud-solution revenue over the last few years, and there is no slowdown in sight.

3 Security Trends Every CISO Needs to Know in 2023

3 Security Trends Every CISO Needs to Know in 2023

Cybersecurity has dominated the headlines in recent years as cyber attacks have risen at an increasingly alarming rate. In fact, global attacks increased by 28% in the third quarter of 2022 compared to the same period in 2021.

It is Time for Blockchain to Embrace the Level of Security Its Users Deserve

It is Time for Blockchain to Embrace the Level of Security Its Users Deserve

Blockchain technology was built in part on a principle of high-level security, but it is increasingly clear that this is not always the case, as noted by a recent DARPA analysis noting how cryptocurrency tech is vulnerable to tampering.

Proactive Cybersecurity: Increased Safety Measures Make All the Difference

The infrastructure of the United States is under attack, as foreign criminals use advanced skills and exploit company vulnerabilities to cripple operations, disrupt industrial control systems, and ultimately inflict significant damage, both monetarily and economically.

Predicting the Cybersecurity Future

Predicting the Cybersecurity Future

Wouldn’t it be nice to have a crystal ball to understand exactly what we can expect in 2023 from the Cybersecurity world?

Constantly Evolving

Constantly Evolving

Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.

Is your access control system cyber secure?

Is Your Access Control System Cyber Secure?

Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.

Fortanix Expands Relationship with AWS, Fortanix Data Security Manager Works with the AWS KMS External Key Store

Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.

Debunking the Misconceptions of Open Source Security Platforms

The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.

Predicting the Cyber Future

Predicting the Cyber Future

A look ahead to 2023 we can expect to see changes in MFA, continued Hactivism from non-state actors, CISOs lean in on more proactive security and crypto-jackers will get more perceptive.

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Vulcan Cyber, developers of the unified cyber risk and security posture management platform, recently announced the latest results of its ongoing research into vulnerability risk management initiatives and risk impact on business operations. The survey finds 75% of organizations have dedicated threat intelligence teams and two-thirds have dedicated threat intelligence budgets

Research: One-Third of Organizations Forced to Change Leadership as a Result of a Cyberattack

Research: One-Third of Organizations Forced to Change Leadership as a Result of a Cyberattack

IT and security leaders must address, on average, one cyberattack per week according to a new study released titled “The State of Data Security” by Rubrik Zero Labs. Rubrik, the Zero Trust Data Security Company, commissioned a study from Wakefield Research to gather insights from more than 1,600 security and IT leaders including CISOs, CIOs, VPs, and Directors across 10 countries.

Securing Overlooked IoT Devices from Cyber Criminals

Securing Overlooked IoT Devices from Cyber Criminals

When it comes to cybersecurity, many organizations overlook IoT devices; but it is imperative that they are given equal consideration, as these devices are connected to the internet (i.e. printers, security cameras and smart home hubs) and can serve as an open door for cyber criminals.

Report: Ransomware Attacks Trending Down in the United States

Report: Ransomware Attacks Trending Down in the United States

SonicWall recently released new threat data through the third quarter of 2022. SonicWall recorded more than 4 billion malware attempts globally while year-to-date ransomware attempts in 2022 have already exceeded full-year totals from four of the last five years. In the recent 2022 SonicWall Cyber Threat Mindset Survey, 91% of organizations reported that they are most concerned about ransomware attacks, indicating a rise of anxiety among security professionals.

Top 5 Cloud Data Security Best Practices for Cyber Awareness Month and How to Get There

Top 5 Cloud Data Security Best Practices for Cyber Awareness Month and How to Get There

Cloud data security is a serious challenge most organizations face today. The cloud was designed for collaboration where every file or data element can be shared with anyone halfway around the globe. Cloud data can also be copied, duplicated, modified and passed along very easily. To illustrate the challenge, think about 100 different variations of a redlined sensitive contract that need to be protected, and consider that each variant can have different access privileges.

Research: Cybersecurity Remains Top Concern for Physical Security Professionals

Research: Cybersecurity Remains Top Concern for Physical Security Professionals

As cybersecurity awareness month continues to be a focus of discussion in October, new research conducted by Genetec, technology provider of unified security, public safety, operations, and business intelligence solutions, shows that cybersecurity remains a top concern for physical security professionals going into 2023.

It is Time to Think about Cyber Awareness

Cyber Awareness Month is upon us and we want to share some of our best practices for what organizations can do to enhance their security posture while remaining vigilant to stay ahead of threats as best they can.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.