Cyber Security

Blueshift Cybersecurity Launches Comprehensive Managed Cybersecurity Platform

Blueshift Cybersecurity? announces the global launch of Blueshift XDR the first cybersecurity management service that provides efficient and cost-effective cybersecurity protection for SMB businesses and the defense industry. Blueshift XDR? combines industry-unique detection and prevention capabilities with a dedicated 24/7/365 US-based security-operations center to deliver effective, comprehensive and affordable cybersecurity protection to organizations of all sizes.

HID Global Offers its European Customers PKIaaS with Full Local Data Residency, Failover and Redundancy

Increasingly European enterprises must comply with regulations for establishing local residency of data and security infrastructure. HID Global now delivers its Public Key Infrastructure (PKI) as a Service (PKIaaS) with high availability and redundancy via a hybrid of data centers and cloud regions operated within the EU, enabling what it expects to be a growing number of European customers to simplify regulatory compliance.

Major Airports Turn to HID Global to Help Navigate Bumpy Travel Industry Recovery

As airports navigate an uneven return to pre-pandemic operations, many of the largest are using HID SAFE for Aviation as a unified physical identity and access management solution for defending against security and safety threats while consolidating, automating, and simplifying associated administrative and regulatory processes.

WatchGuard Cloud Adds New Endpoint Security Modules Further Strengthening Its Unified Security Platform

WatchGuard Technologies announced four new endpoint security modules in WatchGuard Cloud including WatchGuard Patch Management, WatchGuard Full Encryption, WatchGuard Advanced Reporting Tool (ART), and WatchGuard Data Control. This integration further strengthens WatchGuard?s Unified Security Platform? and gives solution providers and customers centralized access to all WatchGuard endpoint solutions, with the ability to layer on additional security services such as network security, MFA, and secure Wi-Fi.

March Networks Achieves Certification for Cybersecure Business Practices

March Networks announce that it has achieved CyberSecure Canada certification, developed by the Canadian Centre for Cyber Security, Canada?s authority on cybersecurity. In order to become certified, an organization must put into place the requirements of the 13 security control areas developed by the Centre. Examples of these control areas include developing an incident response plan, implementing strong user authentication, providing employee training, implementing data recovery methods, and ensuring encryption across all data.

The Security of IoT Devices Relies on Secure Updates and Cyber Resiliency, says TCG

To increase the resiliency of IoT devices from cyber-attacks, IoT manufacturers need to have a security-first approach and combine the latest updates and techniques, Sunil Cheruvu, Co-Chair of Trusted Computing Group?s (TCG) Internet of Things Work Group, said today. Speaking at the IoT Device Security Conference, Cheruvu stressed the importance of preparing the best response to inevitable cyberattacks.

Genetec Shares its Top Physical Security Trends Predictions for 2022

Genetec shared its top predictions for the physical security industry in 2022. Within months of the pandemic, businesses were deploying different solutions to track occupancy in their buildings and control social distancing. Almost two years later, this trend is still growing because they?re seeing value from the data collected. Beyond safety objectives, organizations will embrace the use of spatial analytics data to reduce wait times, optimize staff scheduling, and enhance business operations.

Botnet Buster Finds IoT Command and Control Centers

Did you know that your home smart devices could be soldiers in a malicious robot army called a botnet? Smart devices range from refrigerators that let you peer inside them remotely to baby monitors that let you check on your baby from wherever you are in the house. To criminals, these, along with wireless printers, wearable health monitors, and countless other internet-connected household and office devices look like a vast army of docile robots waiting to do their dark bidding.

Healthcare OT Facilities Remain Exposed as Industry Experienced 68 Attempted Ransomware Attacks in Q3

Last month saw an alarming rise in cyber attacks against healthcare facilities. Ransomware attacks across the globe locked 68 care providers out of their respective networks during Q3 of this year alone, threatening patient safety and privacy. Experts fear that patients will suddenly be unable to receive critical care at a targeted facility without a holistic whole-facility cybersecurity approach.

Arcules Achieves SOC 2 Type II Compliance

Arcules announced that it has completed its System and Organization Controls (SOC) 2 Type II certification. The process affirms Arcules? information security practices, policies, procedures, and operations meet the SOC 2 standards for security, availability, and confidentiality. SOC 2 is an auditing procedure that ensures service providers securely manage customer data. Developed by the American Institute of CPAs (AICPA), SOC 2 defines criteria for managing customer data based on trust principles.

Monitoring of Energy Networks: How to Make it Easy and Secure

Cloud and cyber security in critical energy applications – Digitalization and IoT is a clear trend within power plants and substations, just as it is in industrial automation. The Smart Grid is certainly a driving factor, but there are also other reasons for this change. Operators often find that only having data available in the control room is insufficient. Instead, they want to monitor transformers remotely, implement new maintenance concepts from anywhere, optimize utilization and commissioning, or retrieve environmental data online.

oneM2M Invites Contributions on Future Roadmap for IoT Systems

oneM2M is currently finalizing a set of specifications for Release 4 of the standard while conducting parallel work on features to include in Release 5. Some of the new features under discussion include the topics of AI for Internet of Things (IoT) systems, tools for data licensing and, controls to guarantee adherence to privacy regulation such as GDPR and PIPA (Korea). Participation in oneM2M?s technical standardization activities is open to organizations across the world.

DHS S&T Launches Series 3 of Virtual Whole-of-Government R&D Showcase

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) launched the third installment of the Virtual Whole-of-Government R&D Showcase. This unique four-part series highlights how S&T and its partners across government are mobilizing research and development (R&D) teams to reduce risks from natural and human-induced disasters; accelerating breakthrough discoveries; and helping the nation prepare against future threats and unknowns.

Ontic Expands Investigations and Case Management

Ontic announced the expansion of its Protective Intelligence platform to fully integrate a new Investigations and Case Management offering. Purpose-built for corporate security and physical threat investigations teams, the new Ontic solution enables them to research, document, track, report and recommend preventive measures for cases in order to mitigate future incidents.

ComNet Launch Razberi Monitor Software for Cybersecurity

ComNet announced the launch of Razberi Monitor software. Razberi Monitor is the latest addition to the ComNet product portfolio and the first solution to be rolled out from the recently acquired Razberi brand. Razberi Monitor? is a software platform that provides a top-down view of the physical security network and ecosystem without IT resources. It monitors and manages all the system components for both cybersecurity and system health, and can be deployed from the cloud or on-premise.

Genetec Warns Older Legacy Access Control Systems Cyber-attacks

?Legacy access control systems use outdated technology that leaves them vulnerable to cyber threats, and can cause damage beyond the door,? cautions Thibault Louvet, Director – Access Control Product Group at Genetec Inc. With the average cost of a data breach being US$3.9* million in damages, it?s never been more important for organizations to be educated on the risks associated with legacy systems and the advantages that a new cyber-secure access solution can offer.

Cybersecurity Experts Releases Cyber Defense Guide for CEOs

ProtectedBy.AI, has released Stay Cyber Safe: What Every CEO Should Know About Cybersecurity. The book is authored by leading cybersecurity experts, JT Kostman, Ph.D., and Brian Gallagher, who are the co-founders of ProtectedBy.AI. Stay Cyber Safe is available on Amazon and has already reached the No. 1 spot on Amazon?s Best-Selling Books list for Information Management during the first week of pre-lease sales. Due to its success Amazon has decided to release and ship early sales.

Infosec and CISA to Provide Free Tools to Fight Ransomware

Following several notable ransomware incidents in 2021, the Cybersecurity and Infrastructure Security Agency (CISA), the nation?s risk advisor dedicated to building the national capacity to defend against cyberattacks, and Infosec, the leading cybersecurity education company, are sharing no-cost resources to help businesses keep their organization secure. Now more than ever, ransomware is a key challenge for organizations of all sizes, with 10% of all data breaches involving ransomware.

Wirepas announces game-changing connectivity system for smart tracking

Wirepas announced the release of Wirepas Massive Tracking. The new smart tracking software suite embeds Wirepas Massive ? the company?s large-scale mesh connectivity software for massive IoT. Deploying wired positioning infrastructure across large spaces like warehouses, construction sites, campuses or hospitals is costly and time consuming. Wirepas Massive Tracking solves exactly these issues. A smart tracking system in a 100,000 m

Phison and Cigent Partnership Sets New Standard in Cybersecurity

Phison Electronics Corp and Cigent Technology, unveiled design details behind the partnership that has delivered the industry?s first and only line of self-defending storage devices with cybersecurity built into the firmware itself to protect against ransomware, data theft and malicious insider theft. Phison?s innovative and robust NAND flash solutions support a broad range of applications including embedded, consumer, enterprise and automotive.