CyberSecurity


National Cybersecurity Alliance and PCI Security Standards Council Issue Joint Bulletin on Ransomware Attack

National Cybersecurity Alliance and PCI Security Standards Council Issue Joint Bulletin on Ransomware Attack

The PCI Security Standards Council (PCI SSC) and the National Cybersecurity Alliance issued a joint bulletin on the increasing threat of ransomware attacks.



Mostly Ignored Cybersecurity Collaboration is Becoming a Reality

Times have started changing for the better in the U.S. cybersecurity world. After years of minimal effort to get together to discuss cyberattacks and breaches and share some pertinent data, big companies and the federal government have finally started to collaborate on mitigating big cybersecurity issues.

Corporate Organizations: Have You Made Your Solutions Permanent?

For a variety of reasons, cybersecurity experts are urging caution as we enter 2022.

Supply Chain Hits Cybersecurity Hard

The unpredictable shortage of goods because of pandemic-triggered supply chain problems is broad: plastic cup lids, woodworking tools, paper goods, and lumber, to name a few.

Balancing Fraud Prevention and Customer Experience

We sat down with Bala Kumar, CPO of Jumio, to discuss balancing the customer and fraud prevention.

Why Hardware-Encrypted USB Drives Are the Best Option for Regulatory Compliance in 2022

Many governments and industries worldwide have mandated that various forms of personal data be protected by encryption while at rest or in transit.

Countermeasure Considerations

Countermeasure Considerations

In a recent report by the World Economic Forum, Building Resilience in Manufacturing and Supply Systems in the COVID-19 Context and Beyond suggests that manufacturers adopt new working models and governing to increase manufacturing resilience.

Cloud Storage Training

Cloud Storage Training

It is no surprise in the world of video data storage, there is an evolution from on-prem to the Cloud and Video-Surveillance-as-a-Service (VSaaS).

Integrating Networking and Security

Integrating Networking and Security

The security approaches we counted on to secure our networks and protect our IT resources against attackers are no longer up to the task.

Report: Endpoint Malware and Ransomware Continue to Grow

Report: Endpoint Malware and Ransomware Continue to Grow

The data indicates that while total perimeter malware detection volume decreased from the highs reached in the previous quarter, endpoint malware detections have already surpassed the total volume seen in 2020.

Security Industry Association Announces the 2022 Security Megatrends

The Security Industry Association (SIA) has identified and forecasted the 2022 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both short- and long-term change in the global security industry.

How to Know When AI Is the Right Solution

How to Know When AI Is the Right Solution

Given the hype surrounding artificial intelligence (AI), many are following the bandwagon without considering whether their system truly requires the novel tech or not.

Data Protection: Your Best Line of Defense Starts Inside

Data Protection: Your Best Line of Defense Starts Inside

Investing in information security has never been more critical. The COVID-19 pandemic has reshaped the way we work, stressing our systems, connections, and networks. Cyberattacks continue to make headlines, and physical data breaches remain a concern.

Money in the Bank

Money in the Bank

We have all read or heard about incidents of cybercrime targeting government and commercial entities to compromise services or harvest information. As you can image, financial institutions are a primary target for attack.

Encryption and Compliance

Throughout time, securing the data in our communications with others has always been a major concern. Perhaps the prehistoric men or woman, were the only civilization in history that didn’t have to worry about someone getting their hands on someone else’s messages.

6 Easy Ways to Protect Your Business from Ransomware this Holiday Season

The holiday season is almost upon us, and with it come huge opportunities for companies and brands to capitalize with big sales. So much so that many companies depend on the holiday season sales to bring themselves to profitability

Research: 31 Percent of Retail, Restaurant and Hospitality Companies Have Experienced Data Breach

New data released Cornell University’s Center for Hospitality Research and FreedomPay, a global leader in data-driven commerce, reveals that while nearly all (96%) surveyed retail, restaurant and hospitality stakeholders are confident in their companies’ internal risk assessment processes, their satisfaction (95%) in the security of their systems is misaligned with reality, as one-third of companies (31%) have experienced a data breach in their company's history.

Report: 91.5 Percent of Malware Arrived over Encrypted Connections in Q2 2021

Report: 91.5 Percent of Malware Arrived over Encrypted Connections in Q2 2021

WatchGuard Technologies, a provider of network security and intelligence, advanced endpoint protection, multi-factor authentication (MFA) and secure Wi-Fi, recently released its latest quarterly Internet Security Report, detailing the top malware trends and network security threats analyzed by WatchGuard Threat Lab researchers during Q2 2021.

Data Breaches: Top Sectors of Interest in 2021

Cybercriminals have been a nuisance to businesses long before most readers of this blog would’ve gotten versed with the idea of online presence.

October is Cybersecurity Awareness Month

The Cybersecurity and Infrastructure Security Agency (CISA) kicked off Cybersecurity Awareness Month recently, following a proclamation by President Biden designating October as a time for the public and private sectors to work together to continue raising awareness about the importance of cybersecurity and equip the public with the resources they need to be safer and more secure online.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.