 
                    
                                        
		            
                    A new report predicts a new frontier of cyber attacks for healthcare organizations, including ransomware, international espionage and the hacking of biomedical devices. 
                    
			            - By Haley  Samsel
- Aug 22, 2019
 
            
    
                
	                 
                    
                                        
		            
                    Only eight breaches were responsible for the exposure of 3.2 billion records in the first half of the year, according to new research. 
                    
			            - By Haley  Samsel
- Aug 22, 2019
 
            
                
	                 
                    
                                        
		            
                    The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”  
                    
			            - By Haley  Samsel
- Aug 20, 2019
 
            
                
	                 
                    
                                        
		            
                    Neglecting basic security practices exposes companies to long-standing security threats.
                    
			            - By Gilad David Maayan
- Aug 19, 2019
 
            
                
	                 
                    
                                        
		            
                    In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate. 
                    
			            - By Haley  Samsel
- Aug 16, 2019
 
            
                
	                 
                    
                                        
		            
                    Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said. 
                    
			            - By Haley  Samsel
- Aug 13, 2019
 
            
                
	                 
                    
                                        
		            
                    Deploying automated decoys can help protect your network and reduce IT costs. 
                    
			            - By Gilad David Maayan
- Aug 12, 2019
 
            
                
	                 
                    
                                        
		            
                    Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients. 
                    
			            - By Bud  Broomhead
- Aug 08, 2019
 
            
                
	                 
                    
                                        
		            
                    The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone. 
                    
			            - By Haley  Samsel
- Aug 08, 2019
 
            
                
	                 
                    
                                        
		            
                    Connecting devices to a 0G network is a simple fix to seemingly insurmountable challenges.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    A Homeland Security agency and the FBI’s El Paso office are cautioning Americans to watch out for malicious "charity" emails and phone call scams. 
                    
			            - By Haley  Samsel
- Aug 07, 2019
 
            
                
	                 
                    
                                        
		            
                    Experts believe Cisco’s payout to a whistleblower could set a precedent for future lawsuits against vendors who sell products with security vulnerabilities. 
                    
			            - By Haley  Samsel
- Aug 06, 2019
 
            
                
	                
                    
                                        
		            
                    At the Cyber:Secured Forum in Dallas, two Pelco employees broke down the "culture shift" from physical to cyber issues in the security industry. 
                    
			            - By Ralph  C. Jensen
- Aug 06, 2019
 
            
                
	                 
                    
                                        
		            
                    Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.
                    
			            - By Gilad David Maayan
- Aug 06, 2019
 
            
                
	                
                    
                                        
		            
                    Why corporations owe it to you and society as a whole to stop data breaches and fraud
                    
			            - By Simon  Marchand
- Aug 05, 2019
 
            
                
	                 
                    
                                        
		            
                    Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests
                    
			            - By Evan  Francen
- Aug 02, 2019
 
            
                
	                
                    
                                        
		            
                    One topic seemed to dominate this year’s conference: the ongoing challenges of integrating physical security technologies with cybersecurity products.
                    
			            - By Haley  Samsel
- Aug 01, 2019
 
            
                
	                 
                    
                                        
		            
                    Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.
                    
			            - By Christina  Luttrell
- Aug 01, 2019
 
            
                
	                 
                    
                                        
		            
                    As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a heavy reliance on the network.
                    
			            - By Moses  Anderson
- Aug 01, 2019