CyberSecurity


70 Percent Of SOC, IT Security Teams Emotionally Overwhelmed By Security Alert Volume

Trend Micro Incorporated recently released results from a new study that reveals SOC and IT security teams are suffering from high levels of stress outside of the working day—with alert overload a prime culprit.



New Fingerprint Technology Can Detect Cocaine Use

New Fingerprint Technology Can Detect Cocaine Use

Dr. Melanie Bailey is a fellow of the Engineering and Physical Sciences Research Council (EPSRC). Her team has identified differences between the fingerprints of people who touched cocaine compared with those who have ingested the drug, even if the hands are not washed.

Technology counts on AI to authenticate and identify people

Always Surrounded

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.

DoD Needs to Invest More in Innovation

Numerous commissions, studies and papers continue to point to the stifling effects of the DoD procurement system on production, efficiency, and innovation as well as lead to bloated price tags like the F-35.

Lessons Learned from Oldsmar Water Plant Hack

Lessons Learned from Oldsmar Water Plant Hack

Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.

Actionable Intelligence

There is no doubt that Artificial Intelligence (AI) is here to stay, as new AI-driven solutions are pervasive across every category of professional and consumer electronics today.

Current and future uses in the commercial security industry

On a Cloud of its Own

Cloud-based technology and solutions have become more and more mainstream, especially in the commercial security industry.

Data Theorem Launches Industry’s First App-Aware Full Stack Cloud Security Product

Data Theorem Inc., today introduced the industry’s first application-aware full stack cloud security product with attack surface management (ASM) for protecting data in cloud-native apps, API services and serverless cloud functions.

Transforming the Industry

Transforming the Industry

Artificial Intelligence (AI) continues to gain momentum every day, and it is already poised to augment and enrich many aspects of our business and personal lives.

Learn to Walk Before Running

Learn to Walk Before Running

Today’s analytics are not only better able to differentiate between true security incidents and false alarms, but can be programmed to trigger when a given event occurs.

Passing Prop 24

Passing Prop 24

Supporters of Prop. 24 posited the CCPA privacy law, even though it had just gone into effect earlier in the year, wasn’t strong enough.

Biden Signs Executive Order calling for Semiconductor Supply Chain Review

Biden Signs Executive Order calling for Semiconductor Supply Chain Review

President Biden has signed another executive order addressing growing concern over a global semiconductor shortage.

Lessons Learned from the Capitol Breach: Immediate Next Steps

Much of the U.S. Capital’s cybersecurity infrastructure must now be considered suspect, given the recent attack, and possible physical and cyber breach of systems, networks and devices.

Injection Attacks Thwarted Since August; The Minerva Approach Proves Itself Once Again

Minerva Labs has announced that the company conducted a thorough review of the cybersecurity threat exposed by the SolarWinds breach.

Scaling Security with GPUs/DPUs for AI and Machine Learning

Scaling Security with GPUs/DPUs for AI and Machine Learning

On March 25, before the full impact of coronavirus hit home and the world was still full of hope, Google News showed an eye-wateringly appealing headline: Cybercrime Gangs Promise to Stop Attacks on Healthcare Organizations During the COVID-19 Crisis.

Can Zero Trust Be Trusted

It’s no surprise that cyber security defenses took their first cues from the physical world. Castles have moats. Your house has a door with a lock. It makes sense to protect your network with a firewall. But cyber criminals soon crashed that plane.

Holiday Security Tips for Malls or Outdoor Shopping Areas

Holiday Security Tips for Malls or Outdoor Shopping Areas

The holiday shopping season is here, let’s not forget that we are in COVID-19 pandemic and health officials continue to repeat their messages about the importance of masks, adequate social distancing, and frequent handwashing.

Chinese-made routers, sold on Amazon and eBay, contain hidden backdoor and are being exploited by Mirai malware and other methods

CyberNews.com’s Investigations team today announced that they have identified hidden backdoors in Chinese-manufactured routers that share common firmware, with evidence that the routers are being exploited by the Mirai malware.

Election Security Separating Rumor from Reality

Election Security: Separating Rumor from Reality

Here is a Q&A that answers questions about spoofing the voter. The answers come from Chris Krebbs, CISA director.

Acting Secretary Chad Wolf Condemns Censorship of Government Officials as a Security Threat, Calls on Twitter to End it

In an open letter to Twitter CEO Jack Dorsey, Department of Homeland Security (DHS) Acting Secretary Chad F. Wolf today called on Twitter to no longer obstruct Americans’ unalienable right to communicate with each other, their government, and its officials on the platform, because doing so endangers the national security.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.