With the ever-increasing rise in cybercrime, Genetec is cautioning organizations of all sizes to be vigilant about the cybersecurity risk posed by legacy access control systems. Vulnerabilities in legacy access control systems can introduce cybersecurity weaknesses that may put an entire organization at risk. Cybercriminals can exploit weaknesses in access control system credentials, controllers, servers, readers, or workstations connected to the network.
Following a pandemic-exacerbated rise in data breaches and ransomware attacks, Genetec guided public sector organizations on how to reduce cyber vulnerabilities of physical security systems that are often overlooked. IP security cameras and other security devices were put in place to protect people, assets, and environments. But the same network connectivity that enables organizations to monitor operations and update software remotely presents a path into the network for cyber criminals. If they are not sufficiently modern or properly shielded, they can pose significant risk to cybersecurity. An attack that originates in a camera or door controller can find its way through the network to block access to critical applications, lock files for ransom, and steal personal data.
ESI ThoughtLab has partnered with the Wall Street Journal, the Security Industry Association and other industry coalition members to release cybersecurity analysis and benchmarks covering 1,300 companies. A comprehensive study about cybersecurity from leading research firm ESI ThoughtLab, together with research partner the Wall Street Journal’s WSJ Pro Cybersecurity and a cross-industry coalition shows that digital transformation is exposing companies to higher and more costly cyber risks.
Fujitsu announced that it is expanding its Fujitsu Security Solution Global Managed Security Service, which provides centralized lifecycle support, from cyberattack prediction to system restoration. The company is strengthening endpoint and cloud security, and will provide analyses of threat information from the dark web. Fujitsu is offering in Japan from May “Fujitsu Security Solution Cybereason EDR Service,” which offers a total package of deployment, operations, and maintenance for Cybereason EDR, software that can detect cyberattacks by unknown sources on endpoints using machine learning.
Following a first survey from December 2016, ReportLinker conducted a new research on cybersecurity to find out if opinions and attitudes towards this threat have shifted since last year. Many Americans don’t feel they personally are at much risk of a cyberattack, they are however a large majority to think cyberattacks are becoming more a threat now.
Discover the most effective steps to prevent cyberattacks and detect adversaries with actionable techniques taught by top practitioners during SANS Tokyo January 2024. Choose your course and register now for hands-on training you can use immediately. SANS Tokyo January 2024 Features Live Online training (see Available Courses for details) Practical cyber security training taught by real-world […]
By Jay Jason Bartlett Airport security is a crucial aspect of air travel since it safeguards the safety and security of passengers, employees, and aircraft. In reaction to the rise in terrorism and other security threats, airports have implemented a number of security measures to fortify their defenses. One of the biggest advancements in airport […]
Japan’s first commercial certificate authority incorporating Quantinuum’s Quantum Origin solution to strengthen security protections for IoT devices against current and future threats Quantinuum announced that Cybertrust Japan has integrated its Quantum Origin quantum-computing-hardened private keys into a new certificate issuance and distribution platform for IoT devices to ensure secure communications now and into the future. […]
Genetec shared its top predictions for the physical security industry in 2023. In the Genetec 2022 State of Physical Security Report, 50% of respondents said their physical security team experienced human resource challenges last year. For 2023, security leaders are re-evaluating their technology stack seeking solutions that help streamline tasks, automate processes, and enhance team efficiency. Unifying video surveillance, access control, automatic license plate recognition, communications technology, and other valuable functions can make an operator’s job easier and reduce costs and training. Built-in analytics or decision support features can further streamline operations.
Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC). The 12 published NERC standards are aimed at regulating, enforcing, monitoring and managing the security of the Bulk Electric System (BES) in North America. A subset of the full guidance follows.
Portnox announced the general availability of the first cloud-native IoT security solution to help mid-market and enterprise businesses address rising Internet of Things (IoT) security threats. Now available via the Portnox Cloud, Portnox’s new IoT fingerprinting and profiling capabilities empower organizations to easily and accurately identify, authenticate, authorize, and segment IoT devices across their network to ensure an effective zero trust security posture.
As retailers integrate their digital and physical shopping experiences to future-proof their business models, it’s never been more important to be aware of the cybersecurity vulnerabilities that can be created by digital transformation. As cybersecurity awareness month becomes a focus of discussion in October, Interface Systems shares best practices on how to prevent retail cyber-attacks and mitigate fraud. Retail chains face a variety of security challenges, from connected POS (Point of sale) systems and devices to online ordering and delivery applications. Retailers’ data lakes, which combine their customers’ data with credit card information, make them particularly attractive targets for cybercriminals.
Global Security Exchange (GSX) 2022 has concluded at the Georgia World Congress Center in Atlanta, Georgia. Presented by ASIS International, the event offered discussion and idea exchanges for the global security community. Attendance exceeded projections, with more than 13,000 registrants from 85 countries along with more than 400 exhibitors demonstrating the latest security solutions.
The Delta Electronics received the LEED (Leadership in Energy and Environmental Design) Gold certification in the New Construction category from the United States Green Building Council (USGBC). The certifications categories include Sustainable Sites, Energy & Atmosphere, Materials and Resources, Indoor Environmental Quality, Water Efficiency, Innovation in design, and Regional Priority Credit.
iProov announced that Ajay Amlani has been named SVP, Head of Americas. In this role, Amlani will be responsible for the expansion of iProov’s Genuine Presence Assurance® and Liveness Assurance™ technology in the region. With identity theft and cybercrime increasing dramatically in both North America and Latin America, the demand for secure online identity verification and authentication is soaring. Amlani will be enabling government and private sector organizations to implement multi-factor authentication and passwordless strategies with face biometric technology that maximizes security, usability, inclusivity and privacy.
The region is most vulnerable to cyberattacks in the country as attackers continue to target critical infrastructure sectors, including energy, telecom, utility, defense, and other government sectors. The changing nature of global cyberspace is impacting these sectors as the industry is witnessing a surge in ransomware attacks, quasi-kinetic cyberwar, agitation in the darkweb resulting in […]
NanoLock Security announces their full suite of bespoke cybersecurity solutions for the industrial and manufacturing market. The first company to announce device-level protection solutions specifically for legacy and new industrial machinery and smart factory production lines, NanoLock’s industrial protection solutions has been in trials with customers in Europe and is now available worldwide. In the United States, NanoLock’s industrial solutions are available through World Wide Technology (WWT), a major American professional services integrator.
Blueshift Cybersecurity™ announces the global launch of Blueshift XDR the first cybersecurity management service that provides efficient and cost-effective cybersecurity protection for SMB businesses and the defense industry. Blueshift XDR™ combines industry-unique detection and prevention capabilities with a dedicated 24/7/365 US-based security-operations center to deliver effective, comprehensive and affordable cybersecurity protection to organizations of all sizes.
WatchGuard Technologies announced four new endpoint security modules in WatchGuard Cloud including WatchGuard Patch Management, WatchGuard Full Encryption, WatchGuard Advanced Reporting Tool (ART), and WatchGuard Data Control. This integration further strengthens WatchGuard’s Unified Security Platform™ and gives solution providers and customers centralized access to all WatchGuard endpoint solutions, with the ability to layer on additional security services such as network security, MFA, and secure Wi-Fi.
To increase the resiliency of IoT devices from cyber-attacks, IoT manufacturers need to have a security-first approach and combine the latest updates and techniques, Sunil Cheruvu, Co-Chair of Trusted Computing Group’s (TCG) Internet of Things Work Group, said today. Speaking at the IoT Device Security Conference, Cheruvu stressed the importance of preparing the best response to inevitable cyberattacks.