CyberSecurity


How Individuals Can Adopt a Strong Cybersecurity Posture

How Individuals Can Adopt a Strong Cybersecurity Posture

Collectively, as an industry, we need to use the month of October to kick off an ongoing campaign that demonstrates the role each individual plays in both their own and their company’s security, as well as equips them with best practices to adopt a strong security posture. Here are a few practices that will ensure good cyber hygiene.



Cybersecurity Best Practices for Retailers

Cybersecurity Best Practices for Retailers

As retailers integrate their digital and physical shopping experiences to future-proof their business models, it’s never been more important to be aware of the cybersecurity vulnerabilities that can be created by digital transformation.

Why Data Security Posture Management Paves the Way Forward for Effective Data Security

Why Data Security Posture Management Paves the Way Forward for Effective Data Security

Enterprises are struggling with three key data challenges. First, there is massive growth in data, often it increases exponentially from year to year. Equally, there is massive migration of data to the cloud. And finally, the data that is worth protecting has become a very complex environment – from Intellectual Property to financial data to business confidential information to regulated PII/PCI/PHI data.

Shopping for Cybersecurity Assurance

Shopping for Cybersecurity Assurance

Walk into any grocery store today and you’ll see shelves of products claiming to be “organic” and “natural”, but, if you carefully inspect the ingredients, it becomes evident that most of the products are neither natural nor organic. Shoppers need to do their homework and look beyond the shiny labels. Security integrators are in a similar situation when it comes to cybersecurity.

Cybersecurity Awareness Month: Meeting Awareness with Action

Cybersecurity Awareness Month: Meeting Awareness with Action

Cybersecurity Awareness Month allows us to reflect on our progress in information security and the components that still need work. As the term “cybersecurity” has made its way into mainstream vernacular (not just in sci-fi movies but in everyday conversations in the workplace and home), it would be tough to argue that cybersecurity awareness hasn’t grown tremendously in the past few years.

i-PRO Shares IoT Pillars of Cybersecurity for Cybersecurity Awareness Month

i-PRO Shares IoT Pillars of Cybersecurity for Cybersecurity Awareness Month

i-PRO Co., Ltd is proud to join with the Department of Homeland Security Cyber and Infrastructure Security Agency (DHS CISA) to raise awareness around cybersecurity for NCSAM (National Cyber Security Awareness Month).

Travelers Risk Index Shows Cyber Threats Remain Top Overall Business Concern

The Travelers Companies, Inc. recently released its 2022 Travelers Risk Index results, and for the third time in four years, the survey found that cyber threats were the top overall concern for business decision makers.

Commvault Enables Early Threat Detection and Zero Loss Strategy with Metallic® ThreatWise™

Commvault has announced the general availability of Metallic® ThreatWise™ an early warning system that proactively surfaces unknown and zero-day threats to minimize compromised data and business impact.

Versa Networks Receives Highest Score for Large Global WAN Use Case in 2022 Gartner® Critical Capabilities for SD-WAN Report

Versa Networks has announced that Gartner, a company that delivers actionable, objective insight to its executive and their teams, has given Versa Networks (Versa Operating System VOS™) the highest score for the Large Global WAN Use Case, as published in the 2022 Gartner Critical Capabilities for SD-WAN report.

Dispelling the Myths

Dispelling the Myths

We hear the term “best practices” a lot, but the truth is, there are still plenty of bad practices in use that put people and assets at risk every day. Many of those bad practices are grounded in one or more of the following myths that commonly lure people and organizations into a false sense of security.

Evolving Security for Protecting Today’s Financial Services Networks

Today’s businesses have seen increasing pressure to digitize their services, but few industries have felt this pressure more than the financial sector. Customers have grown to demand high-quality digital services, and the expectation is that these services are delivered with a high degree of security and reliability.

The Final Frontier for Quantum-Resilient Cybersecurity: Why We Need to Incorporate Post-Quantum Cybersecurity into Satellite Communication Architectures

Staring up into the sky on a clear night, you may be inclined to think that the small shining light moving gently across the black background is a shooting star or perhaps even a UFO. More likely, that tiny speck of light moving over your head is a satellite orbiting thousands of miles above the clouds

September is National Insider Threat Awareness Month

The National Counterintelligence and Security Center (NCSC), the National Insider Threat Task Force (NITTF), the Office of the Under Secretary of Defense Intelligence and Security, the Defense Counterintelligence and Security Agency, and the Department of Homeland Security today launched the fourth-annual “National Insider Threat Awareness Month” (NITAM).

Business Leaders Rank Cybersecurity as Most Serious Risk Facing Their Company

Amid increasing geopolitical tensions and consumer privacy concerns, business leaders (40%) ranked cybersecurity as the number one serious risk facing their companies. It’s not just top of mind for Chief Information Security Officers and Chief Risk Officers—executives across the entire C-suite ranked cybersecurity as a serious risk

Study: 64% of Businesses Suspect They’ve Been Targeted or Impacted by Nation-State Cyber Attacks

Venafi, provider of machine identity management, today announced the findings of new research that evaluates the security impact of the increasing number of nation-state attacks and recent shifts in geopolitics. Venafi research into the methods used by nation-state threat actors shows the use of machine identities is growing in state-sponsored cyberattacks.

Survey: 58 Percent of Organizations Say Third Parties and Suppliers Were Target of Cloud-Based Breach

Survey: 58 Percent of Organizations Say Third Parties and Suppliers Were Target of Cloud-Based Breach

Proofpoint, Inc., a cybersecurity and compliance company, announced the release of its latest study, Cloud and Web Security Challenges in 2022, in collaboration with The Cloud Security Alliance (CSA).

Prioritizing Vulnerabilities is a Flawed Process: What’s Needed

The topic of zero-day exploits and exposed vulnerabilities is always trending within cybercriminal communities, both on clear web platforms and on the underground. From 280-character tweets circulated among cybercriminals on Twitter, to POC exploits released on clear web code repositories, to exploit kits and tools shared across the forums and markets of the deep and dark web, threat actor discourse revealing which vulnerabilities they plan to target is far from scarce.

(ISC)² Pledges to Expand and Diversify the Cybersecurity Workforce with Free Certification Education and Exams for 1 Million

(ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – recently announced the (ISC)² One Million Certified in Cybersecurity℠ program, pledging to put one million people through its foundational Certified in Cybersecurity entry-level certification exam and education program for free.

Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

IBM Security recently released the annual Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations.

Expanding Safety-Sensitive Roles to Address Cyberattacks

The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.