CyberSecurity


4 Email Phishing Scams to Avoid

4 Email Phishing Scams to Avoid

Before you go wading into all your unread emails from over the holidays, it’s a good idea to brush up on phishing email scams, which can lead to financial loss, compromised accounts, identity theft, ransomware infection and insecure data.



Where We Are Headed with Cybersecurity

Where We Are Headed with Cybersecurity

As we enter 2018 and desire to protect both our own personal digital assets as well as critical corporate data, it is useful to examine the anticipated key trends in cybersecurity in 2018.

The Future of Cyber Attacks

The Future of Cyber Attacks

In 2018 we can expect to see continued creativity from nation-state actors, a growing focus on industrial control systems, and efforts to compromise the software supply chain.

A Data Breach in Who-Ville

A Data Breach in Who-ville

This holiday season, however, after a year of nasty data breaches, it feels appropriate to take Dr. Seuss’ How the Grinch Stole Christmas[2] and analyze it with some of the basic questions we ask during a data breach.

White House Blames North Korea for WannaCry Attacks

White House Blames North Korea for WannaCry Attacks

The White House has publicly blamed North Korea for the WannaCry ransomware attack earlier this year that locked more than 300,000 computers in 150 countries.

DHS Project Finds Security Vulnerabilities in First Responder Apps

DHS Project Finds Security Vulnerabilities in First Responder Apps

The DHS’s Science and Technology Directorate “Securing Mobile Applications for First Responders” report said that security flaws were discovered on 32 of the 33 popular apps tested.

Versatile Android Malware Can Cause Physical Damage to Phones

Versatile Android Malware Can Cause Physical Damage to Phones

Cybersecurity firm Kaspersky Labs reported Monday on a new “jack of all trades” Android malware threat they’ve dubbed Loapi.

Malware Targets Industrial Safety Systems

Security firm FireEye disclosed Thursday the existence of a malware used to compromise industrial control systems and disable their safety systems to potentially cause physical damage.

3 Plead Guilty in Mirai Botnet-Related Charges

3 Plead Guilty in Mirai Botnet-Related Charges

Three defendants have pleaded guilty to charges involving the Mirai botnet that was used to knock out several major websites last year, according to court documents unsealed on Tuesday.

What the FCC

What the FCC's Recall on Net Neutrality Means for Cybersecurity

The FCC has voted to roll back an Obama-era Net Neutrality Rules.

Survey of U.S. Physicians Reveals Cybersecurity and HIPAA Concerns

Survey of U.S. Physicians Reveals Cybersecurity and HIPAA Concerns

More than four in five U.S. physicians (83 percent) have experienced some form of cyberattack, according to new survey research released by Accenture and the American Medical Association.

Data Breach Industry Forecast Offers Businesses Predictions and Advice

Data Breach Industry Forecast Offers Businesses Predictions and Advice

Experian’s Data Breach Resolution released its Data Breach Industry Forecast on Tuesday in an effort to help key business decision makers prepare against cybercrime in the year ahead.

Store Data Overseas? What CSPs Need to Know About Microsoft

Store Data Overseas? What CSPs Need to Know About Microsoft's SCA Challenge

An upcoming ruling by the Supreme Court of the United States (SCOTUS) may drastically change how and where CSPs decide to store customer data.

County Slowed Down by Ransomware After Refusing to Pay Hacker

County Slowed Down by Ransomware After Refusing to Pay Hacker

Mecklenburg County, N.C., is working toward fixing its computer systems after refusing to pay a hacker who used ransomware to freeze dozens of local government servers.

3 More Hackable Toys NOT to Buy Your Kids This Holiday Season

3 More Hackable Toys NOT to Buy Your Kids This Holiday Season

The clock is ticking on gift-buying this holiday season, but that’s no excuse not to do some research before you buy connected toys.

What’s Trending for 2018

What’s Trending for 2018

Technology is perpetual motion personified. It is always marching forward, striving to become smarter, faster, more resilient, and more efficient than its predecessor.

Moving the Discussion Forward

Moving the Discussion Forward

Only a few years ago, the inevitable shift to all things Cloud was met with guarded optimism. But today, the shift is really happening.

5 Ways to Protect Your Accounts from Hackers

5 Ways to Protect Your Accounts from Hackers

Being online puts you and your data at risk, but there are ways you can minimize your risk and make a hacker’s job harder.

Top 5 Tips to Prevent Data Breaches

Top 5 Tips to Prevent Data Breaches

With hacks, attacks, ransoms and even extortion attempts, 2017 has been the year of data breaches, and it’s not even over yet.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.