Digital banking has become commonplace across the world, with the number of people using these services projected to reach 3.6 billion by 2024.
- By Thorsten Stremlau
- May 30, 2023
In an era marked by technological advancements and increasing security concerns, the integration of artificial intelligence (AI) into video surveillance systems has revolutionized situational awareness and critical infrastructure protection.
- By Arthur Kull
- May 25, 2023
Over three-quarters (77%) of organizations across US critical national infrastructure (CNI) have seen a rise in insider-driven cyber threats in the last three years, according to new research by leading cyber security services firm Bridewell.
Imperva Inc. recently released 2023 Imperva Bad Bot Report, a global analysis of automated bot traffic across the internet. In 2022, nearly half (47.4%) of all internet traffic came from bots, a 5.1% increase over the previous year. The proportion of human traffic (52.6%) decreased to its lowest level in eight years.
Black Kite, provider third-party cyber risk intelligence, recently released its highly anticipated report, “Ransomware Threat Landscape 2023: Ransomware Resurgence”.
More than three quarters (77 percent) of IT decision makers across the United States and Canada believe their companies are likely to face a data breach within the next three years according to survey results released recently by Adastra, the global Data and Analytics solution provider.
Today, financial institutions across the globe focus on security and safety more than ever before. Known threats, such as workplace violence, terrorism, and natural disasters, continue to be significant challenges, while cybersecurity risks have expanded.
- By Alan Stoddard
- Sep 19, 2022
Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).
- By Dave Krauthamer
- May 02, 2022
Few sectors face higher regulation and compliance standards in the United States than the aviation industry.
- By Kevin Tomich
- Apr 01, 2022
What you are about to read is like an old-fashion action-thriller book or movie. There is a very mean-spirited evil villain, and, happily, a protagonist to save the day.
- By Richard Kanadjian
- Mar 01, 2022
Let’s admit it. When analytics first hit the market, they got off to a rocky start. Lots of hype, and high expectations. When it came to delivering on those promises, their performance often fell short of the mark.
- By Robert Muehlbauer
- Dec 01, 2021
The term “smart city” has created a buzz in the past few years. More than that, the smart city concept is changing the way the world’s metropolitan areas operate. New York, Chicago, San Francisco and Seattle have integrated a variety of intelligent sensors to improve city operations.
- By Jason Bonoan
- Aug 02, 2021
Last year, global citizens experienced dramatic shifts to working from home in response to COVID-19 safety recommendations, with communication, technology and security companies supporting changing business and consumer needs with new products, services and data security tools.
It is amazing that the year of convergence from analog to IP was supposed to be 2008 but it was not until 2012 that IP-cameras started to outsell analog cameras. We sure have come a long way from those analog-oriented days.
- By Jay Jason Bartlett
- Feb 01, 2021
Over the past week, CBP officers in Cincinnati seized 200 counterfeit jerseys determined to have several athletes’ autographs that were unapproved and inauthentic. Had the clothing been real, their cumulative value would have been $42,625.
It’s no surprise that cyber security defenses took their first cues from the physical world. Castles have moats. Your house has a door with a lock. It makes sense to protect your network with a firewall. But cyber criminals soon crashed that plane.
- By Karthik Krishnan
- Dec 03, 2020
More than 100 Republican national security experts on Monday called on GOP congressional leaders to push President Donald Trump to concede the election to President-elect Joe Biden, according to the Washington Post. In a signed letter, the experts urged current GOP officeholders and Trump to prioritize the country's national security interests above politics.
Here is a Q&A that answers questions about spoofing the voter. The answers come from Chris Krebbs, CISA director.
The 2020 election season is a Big Deal as well it should be. The Vote, as foundational parts of the whole, is complicated in practice with history showing us just how complicated it can be. Protecting the process and making sure the Vote is fair, secure, and timely, is vital to American Democracy.
- By Saryu Nayyar
- Oct 28, 2020
Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionally, the ability to protect data and code is limited in conventional computing infrastructure.