Data Security


Protecting Cloud Apps Common in Healthcare with API Security

Protecting Cloud Apps Common in Healthcare with API Security

Many healthcare information systems (HIS) applications rely on APIs to exchange data and interact with external systems. With the increasing adoption of cloud computing, the usage of APIs has grown exponentially in healthcare

Standing on a Cloud Platform

You might say Robert Messer has his head in the clouds. He is the founder and manager of IPTECHVIEW, and his goal has always been addressing the co-exisitence of the cloud and security solutions. His goal was a new platform selling components such as security cameras, NAS systems for video archiving and various VMS to resellers and installers.

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Pluralsight recently released its second annual State of Cloud Report, which compiles survey results from more than 1,000 technologists and leaders in the United States, Europe, Australia, and India on the most current trends and challenges in cloud strategy and learning. The study findings reveal a large multicloud skills gap, underscoring how critical cloud skills development is for organizations to ensure the multicloud reward outweighs the risk.

Why Hackers Have Their Sights Set on Healthcare

Why Hackers Have Their Sights Set on Healthcare

We see it time and time again, the headlines splashed along newspapers and email newsletters that a hospital or its network of offices have been hit in a cybersecurity attack. Now more than ever, we continue to expect that attackers will target nursing homes, doctors’ offices, and other medical facilities due to the immense pressure the industry is facing to modernize. While the advancements in technology are vital to ensuring better patient care, they also open doors for threat actors everywhere.

Protecting Sensitive Data

Digital banking has become commonplace across the world, with the number of people using these services projected to reach 3.6 billion by 2024.

Enhancing Situational Awareness

In an era marked by technological advancements and increasing security concerns, the integration of artificial intelligence (AI) into video surveillance systems has revolutionized situational awareness and critical infrastructure protection.

Survey: Insider Threats Surge Across U.S. Critical Infrastructure

Survey: Insider Threats Surge Across U.S. Critical Infrastructure

Over three-quarters (77%) of organizations across US critical national infrastructure (CNI) have seen a rise in insider-driven cyber threats in the last three years, according to new research by leading cyber security services firm Bridewell.

Report: 47 Percent of Internet Traffic is From Bots

Report: 47 Percent of Internet Traffic is From Bots

Imperva Inc. recently released 2023 Imperva Bad Bot Report, a global analysis of automated bot traffic across the internet. In 2022, nearly half (47.4%) of all internet traffic came from bots, a 5.1% increase over the previous year. The proportion of human traffic (52.6%) decreased to its lowest level in eight years.



New Research Shows Ransomware Attacks Resurge with Victims Doubling in 2023

New Research Shows Ransomware Attacks Resurge with Victims Doubling in 2023

Black Kite, provider third-party cyber risk intelligence, recently released its highly anticipated report, “Ransomware Threat Landscape 2023: Ransomware Resurgence”.

10 Data Security Enhancements for Your Business

10 Data Security Enhancements for Your Business

More than three quarters (77 percent) of IT decision makers across the United States and Canada believe their companies are likely to face a data breach within the next three years according to survey results released recently by Adastra, the global Data and Analytics solution provider.

Harmonizing the Power of Data

Today, financial institutions across the globe focus on security and safety more than ever before. Known threats, such as workplace violence, terrorism, and natural disasters, continue to be significant challenges, while cybersecurity risks have expanded.

Building the Future We Deserve – A Cyber Success Story

Building the Future We Deserve – A Cyber Success Story

Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).

Similarities at Data Centers and Airports

Similarities at Data Centers and Airports

Few sectors face higher regulation and compliance standards in the United States than the aviation industry.

Overcoming the Problems

Overcoming the Problems

What you are about to read is like an old-fashion action-thriller book or movie. There is a very mean-spirited evil villain, and, happily, a protagonist to save the day.

Yesterday’s Hype

Yesterday’s Hype

Let’s admit it. When analytics first hit the market, they got off to a rocky start. Lots of hype, and high expectations. When it came to delivering on those promises, their performance often fell short of the mark.

4 Steps to Ready

4 Steps to Ready

The term “smart city” has created a buzz in the past few years. More than that, the smart city concept is changing the way the world’s metropolitan areas operate. New York, Chicago, San Francisco and Seattle have integrated a variety of intelligent sensors to improve city operations.

The Digital Year

Last year, global citizens experienced dramatic shifts to working from home in response to COVID-19 safety recommendations, with communication, technology and security companies supporting changing business and consumer needs with new products, services and data security tools.

A Technology Advancement

It is amazing that the year of convergence from analog to IP was supposed to be 2008 but it was not until 2012 that IP-cameras started to outsell analog cameras. We sure have come a long way from those analog-oriented days.

Cincinnati CBP Seizes 200 Counterfeit Autographed Jerseys Worth $42,625

Cincinnati CBP Seizes 200 Counterfeit Autographed Jerseys Worth $42,625

Over the past week, CBP officers in Cincinnati seized 200 counterfeit jerseys determined to have several athletes’ autographs that were unapproved and inauthentic. Had the clothing been real, their cumulative value would have been $42,625.

Can Zero Trust Be Trusted

It’s no surprise that cyber security defenses took their first cues from the physical world. Castles have moats. Your house has a door with a lock. It makes sense to protect your network with a firewall. But cyber criminals soon crashed that plane.

Featured

  • ASIS International and SIA Release “Complexities in the Global Security Market: 2024 Through 2026”

    ASIS International and the Security Industry Association (SIA) – the leading security associations for the security industry – have released ”Complexities in the Global Security Market: 2024 Through 2026”, a new research report that provides insights into the equipment, technologies, and employment of the global security industry, including regional market breakouts. SIA and ASIS partnered with global analytics and advisory firm Omdia to complete the research. Read Now

  • President Biden Issues Executive Order to Bolster U.S Port Cybersecurity

    On Wednesday, President Biden issued an Executive Order to bolster the security of the nation’s ports, alongside a series of additional actions that will strengthen maritime cybersecurity and more Read Now

  • Report: 15 Percent of All Emails Sent in 2023 Were Malicious

    VIPRE Security Group recently released its report titled “Email Security in 2024: An Expert Look at Email-Based Threats”. The 2024 predictions for email security in this report are based on an analysis of over 7 billion emails processed by VIPRE worldwide during 2023. This equates to almost one email for everyone on the planet. Of those, roughly 1 billion (or 15%) were malicious. Read Now

  • ASIS Announces ANSI-Approved Cannabis Security Standard

    ASIS International, a leading authority in security standards and guidelines, proudly announces the release of a pioneering American National Standards Institute (ANSI)-approved standard dedicated to cannabis security. This best-in-class standard, meticulously developed by industry experts, sets a new benchmark by providing comprehensive requirements and guidance for the design, implementation, monitoring, evaluation, and maintenance of a cannabis security program. Read Now

Whitepapers

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3