CyberSecurity


Genetec Achieves Stringent Certifications through Commitment to Cybersecurity and Privacy

Genetec Inc. has achieved a number of certifications underscoring its unwavering commitment to ensuring the cybersecurity of its solutions and the ISMS (information security-management systems) that govern them.



10 Data Security Enhancements for Your Business

10 Data Security Enhancements for Your Business

More than three quarters (77 percent) of IT decision makers across the United States and Canada believe their companies are likely to face a data breach within the next three years according to survey results released recently by Adastra, the global Data and Analytics solution provider.

Russian Hackers Attempting to Use ChatGPT for Malicious Use

Russian Hackers Attempting to Use ChatGPT for Malicious Use

While OpenAI’s ChatGPT tool features a number of safeguards, that’s not stopping hackers from trying to make use of the tool for malicious intent.

ChatGPT Creates Polymorphic Malware

ChatGPT Creates Polymorphic Malware

The use of AI-assisted coding has the potential to revolutionize the way we develop software, but it also poses new risks to cybersecurity. It is important for organizations to understand the potential for malicious use of AI models and take proactive steps to mitigate these risks.

Darktrace Predicts Changing Role for CISO

Darktrace Predicts Changing Role for CISO

Looking forward, Darktrace is offering its 2023 Predictions, including where we can expect to see changes in MFA where accessibility and usability continue to dominate the discussion; continued Hactivism from non-state actors where ‘know thy enemy,

Is Your Security System Holding Back Your Organization’s Cloud Initiative?

Is Your Security System Holding Back Your Organization’s Cloud Initiative?

More organizations today are relying on cloud-based solutions to transform and grow their business than ever before. All major cloud service providers, including Google, Amazon, Microsoft and IBM, have seen astonishing growth in cloud-solution revenue over the last few years, and there is no slowdown in sight.

3 Security Trends Every CISO Needs to Know in 2023

3 Security Trends Every CISO Needs to Know in 2023

Cybersecurity has dominated the headlines in recent years as cyber attacks have risen at an increasingly alarming rate. In fact, global attacks increased by 28% in the third quarter of 2022 compared to the same period in 2021.

It is Time for Blockchain to Embrace the Level of Security Its Users Deserve

It is Time for Blockchain to Embrace the Level of Security Its Users Deserve

Blockchain technology was built in part on a principle of high-level security, but it is increasingly clear that this is not always the case, as noted by a recent DARPA analysis noting how cryptocurrency tech is vulnerable to tampering.

Proactive Cybersecurity: Increased Safety Measures Make All the Difference

The infrastructure of the United States is under attack, as foreign criminals use advanced skills and exploit company vulnerabilities to cripple operations, disrupt industrial control systems, and ultimately inflict significant damage, both monetarily and economically.

Predicting the Cybersecurity Future

Predicting the Cybersecurity Future

Wouldn’t it be nice to have a crystal ball to understand exactly what we can expect in 2023 from the Cybersecurity world?

Constantly Evolving

Constantly Evolving

Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.

Is your access control system cyber secure?

Is Your Access Control System Cyber Secure?

Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.

Fortanix Expands Relationship with AWS, Fortanix Data Security Manager Works with the AWS KMS External Key Store

Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.

Debunking the Misconceptions of Open Source Security Platforms

The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.

Predicting the Cyber Future

Predicting the Cyber Future

A look ahead to 2023 we can expect to see changes in MFA, continued Hactivism from non-state actors, CISOs lean in on more proactive security and crypto-jackers will get more perceptive.

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Lack of Skills is Biggest Threat Intelligence Challenge According to New Survey

Vulcan Cyber, developers of the unified cyber risk and security posture management platform, recently announced the latest results of its ongoing research into vulnerability risk management initiatives and risk impact on business operations. The survey finds 75% of organizations have dedicated threat intelligence teams and two-thirds have dedicated threat intelligence budgets

Research: One-Third of Organizations Forced to Change Leadership as a Result of a Cyberattack

Research: One-Third of Organizations Forced to Change Leadership as a Result of a Cyberattack

IT and security leaders must address, on average, one cyberattack per week according to a new study released titled “The State of Data Security” by Rubrik Zero Labs. Rubrik, the Zero Trust Data Security Company, commissioned a study from Wakefield Research to gather insights from more than 1,600 security and IT leaders including CISOs, CIOs, VPs, and Directors across 10 countries.

Securing Overlooked IoT Devices from Cyber Criminals

Securing Overlooked IoT Devices from Cyber Criminals

When it comes to cybersecurity, many organizations overlook IoT devices; but it is imperative that they are given equal consideration, as these devices are connected to the internet (i.e. printers, security cameras and smart home hubs) and can serve as an open door for cyber criminals.

Report: Ransomware Attacks Trending Down in the United States

Report: Ransomware Attacks Trending Down in the United States

SonicWall recently released new threat data through the third quarter of 2022. SonicWall recorded more than 4 billion malware attempts globally while year-to-date ransomware attempts in 2022 have already exceeded full-year totals from four of the last five years. In the recent 2022 SonicWall Cyber Threat Mindset Survey, 91% of organizations reported that they are most concerned about ransomware attacks, indicating a rise of anxiety among security professionals.

Top 5 Cloud Data Security Best Practices for Cyber Awareness Month and How to Get There

Top 5 Cloud Data Security Best Practices for Cyber Awareness Month and How to Get There

Cloud data security is a serious challenge most organizations face today. The cloud was designed for collaboration where every file or data element can be shared with anyone halfway around the globe. Cloud data can also be copied, duplicated, modified and passed along very easily. To illustrate the challenge, think about 100 different variations of a redlined sensitive contract that need to be protected, and consider that each variant can have different access privileges.

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.