Data Security


Red AI animation overlayed on person using laptop

AI Emerges as Primary Threat to CISOs

A new NCC Group analysis reveals that AI weaponization and internal security gaps drove a 22% surge in monthly cyberattacks.

Doctor entering patient information on computer

US Healthcare Data Breach Crisis Impacts Millions

New research indicates over 2,200 medical centers nationwide have faced cyberattacks since 2023 as states tighten regulations.

Simbian logo on black background

AI Models Struggle to Defend Against Cyberattacks

A new benchmark reveals that while frontier language models excel at exploitation, they fail to autonomously detect sophisticated attack chains.

AMAG and SwiftConnect logos on white background

AMAG Partners With SwiftConnect for Digital Wallet Innovation

The expanded collaboration enables Apple Wallet and Google Wallet mobile credential activation across the AMAG Technology access control portfolio.

Person in black hood holding a laptop

Preparing Financial Institutions for the Quantum Threat

Nokia’s Martin Charbonneau explains why financial institutions must adopt crypto-agility and layered defense to protect against quantum-led breaches.

Graphic of a lock with a hand reaching toward it

Post-Quantum Migration Market Shifts Toward Execution

Experts warn that 2029 deadlines from major tech hubs signal a move from long-term planning to urgent operational requirements.

Burnt out, unhappy employee in office environment

Security Professionals Eye the Exit as Retention Rates Plummet

New industry data shows only about one-third of cybersecurity workers plan to remain in their current roles as burnout and culture concerns rise.

Person pointing at system error on computer screen

Synack Launches Assessment to Counter AI-Driven Threats

The new offering uses autonomous agents and human researchers to identify vulnerabilities before they are exploited by offensive AI.



Americans Overconfident Despite Rising Cyber Risks

New survey data reveals a significant gap between perceived digital safety and the actual security habits of U.S. consumers.

Person typing on keyboard with graphic overlay

Exostar Appoints Amy Hogan as First Chief Information Officer

The former vice president will oversee enterprise technology strategy and platform innovation for the secure collaboration firm.

A-V Services company logo

A-V Services Earns ISO 27001 Information Security Certification

The gold standard certification validates the company's framework for protecting client data and managing information security risks.

OPEX Corporation Completes Cybersecurity Readiness Assessment

The automation leader partners with ONEKEY to align manufacturing processes with upcoming European Union regulatory requirements.

New Report Reveals Global SAP Security Benchmarks

SecurityBridge data shows strengths in system hardening despite persistent gaps in authorizations and data protection.

Panzura Updates CloudFS for AI Efficiency

New hybrid cloud release cuts infrastructure costs and automates data management for AEC firms preparing for agentic AI workflows.

Person in hood typing on computer

March Patch Tuesday Minimal Risks Highlight Shadow AI Threats

Security leaders urged to prioritize internal AI audits over low-impact vulnerabilities as Microsoft releases a quiet monthly update.

Huntress Expands Partner Program to Resellers

The cybersecurity provider aims to bridge the resource gap for the 99% of companies falling outside the Fortune 1000.

AI Displaces Stolen Credentials as Top Identity Concern

New report highlights a shift toward industrial-scale automation as generative and agentic AI become primary threats to enterprise security.

Deploying in a Hybrid, Cloud Environment

The way organizations manage access control is evolving. Traditional on-premises systems come with high IT and server requirements. At the same time, fully cloud-based solutions may not meet the needs of every facility.

Protecting Cloud Apps Common in Healthcare with API Security

Protecting Cloud Apps Common in Healthcare with API Security

Many healthcare information systems (HIS) applications rely on APIs to exchange data and interact with external systems. With the increasing adoption of cloud computing, the usage of APIs has grown exponentially in healthcare

Standing on a Cloud Platform

You might say Robert Messer has his head in the clouds. He is the founder and manager of IPTECHVIEW, and his goal has always been addressing the co-exisitence of the cloud and security solutions. His goal was a new platform selling components such as security cameras, NAS systems for video archiving and various VMS to resellers and installers.

Featured

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”