Outdated camera firmware, and failing to change default passwords present some of the biggest weaknesses in cybersecurity defence. As the number of interconnected security devices keeps on growing, keeping pace with the latest updates can be tricky and very time-consuming. According to new research* conducted by Genetec as many as 68.4%—or almost 7 out of 10—cameras are currently running out of date firmware.
Keyfactor announced the latest update to its award-winning PKI as-a-service and certificate lifecycle automation solution, Keyfactor Command. The offering supports information security, IT and DevOps teams juggling security priorities, regulatory demands and digital transformation. In a recent survey, 44 percent of security and IT professionals indicated that lack of skills and expertise is the greatest challenge they face in managing their organization’s PKI.
Siemplify announced its integration to the MITRE ATT&CK framework, enabling security operations teams to incorporate rich data and actionable intelligence into their incident response workflows. A globally accessible knowledge base of adversary tactics and techniques based on real-world observations, MITRE ATT&CK is used as a foundation for the development of specific threat models and methodologies in the private sector, government and in the cybersecurity product and service community.
According to PreciseSecurity.com, cloud security spending in the United States is expected to reach $1.93 billion by 2021. Back in 2016, the US region spent $675 million on cloud security solutions in total, meaning it will triple in the following years. In comparison with other regions, the United States also represents the leading cloud security spending region in the World, followed by the Asia Pacific with $638 million cloud security costs expected in 2021.
Nearly every industry has undergone some form of digital transformation, and security is no exception. More tech solutions hit the market every day and businesses are starting to see the importance of effectively combining their physical security and cybersecurity practices. The influx of IoT-enabled devices, coupled with an increase in cybercrime, has led businesses to take a hard look at preventative measures to protect their people, property and assets from threats.
Viakoo marks the end of National Cybersecurity Awareness Month with insights from three industries that are familiar with addressing cybersecurity challenges. Data centers have a unique position in today’s business landscape, enabling companies to quickly scale their computing and data processing resources. They also present a particularly attractive target for cybercriminals, because of the density of the valuable customer and business data they hold.
Infocyte introduced their “Response Ready” program for certified IR partners. These elite partners have deployed Infocyte into multiple customer environments during cybersecurity incident response operations and proven their ability to address and remediate active attacks. Additionally, Infocyte announced new platform Extensions enabling customers and partners to develop, deploy, and share custom collection and action capabilities built on top of Infocyte’s award-winning platform.
In September 2019, Proofpoint researchers observed a prolific threat actor, TA505, sending email campaigns that attempt to deliver and install Get2, a new downloader. Get2 was in turn observed downloading FlawedGrace, FlawedAmmyy, Snatch, and SDBbot (a new RAT) as secondary payloads. In this post, Proofpoint will detail the tactics, techniques, and procedures associated with these latest campaigns and provide a detailed analysis of Get2 downloader and SDBbot RAT.
The National Whistleblower Center has established a research partnership with the Center for Cybersecurity at Bradley University. Through this partnership, an academic research working group has been created to facilitate and promote enhanced whistleblower anonymity. Dr. Jacob Young, who has studied whistleblowing systems since 2013, has agreed to serve as the Senior Advisor on Cybersecurity for the National Whistleblower Center. In this role, he will manage and coordinate a multidisciplinary research team.
Qognify announced the latest release of its VMS Cayuga R14. In recent years, dealing with cybersecurity issues to safeguard video installations has become of utmost importance. One of the best ways to reduce network vulnerabilities associated with video surveillance systems is to make sure that the communication between the different components of the video solution is securely encrypted.