The pace of technological innovation is such that even the most fantastic of imagined futures seem like they could easily become reality. As existing technologies reach maturity, unforeseen developments arrive ever more quickly, and innovations make the leap from consumer applications to business (and vice versa) it’s imperative that we constantly seek to find those that have the potential to add value to our own business and those of our customers.
Viakoo has joined Spiceworks Global IT Community and is sponsoring the Physical Security Group as of early 2018. Spiceworks’ global IT community includes millions of IT professionals, over 50,000 of which are subscribed to the Physical Security Group. Though the Physical Security Group is a recent addition to the Spiceworks Community, its rapid growth in recent years demonstrates how integral IT is becoming to many physical security professionals’ operational procedures.
Genetec Inc. announced its plans for ISC West 2018. The company will feature the latest version of Security Center, its flagship unified security platform, and demonstrate Citigraf™, its new decision support system for comprehensive response coordination. Genetec Citigraf is designed to help reduce response time to crimes, and provide insights and analytics on how crime moves across the city, so first responders can take the most effective action with the greatest awareness.
Cyber Investing Summit Keynote Speaker Dave DeWalt and Panelist Eric McAlpine have joined forces to launch Momentum Cyber, a new advisory firm dedicated exclusively to the cybersecurity industry. The firm offers a new and innovative advisory model specifically designed for the cybersecurity industry combining operational excellence, board room, corporate finance, strategy, exit planning, and M&A services throughout the life of a client – Incubation to Exit.
PSA Security Network, the world’s largest systems integrator cooperative, ISC Security Events and the Security Industry Association (SIA), the leading trade association for global security solution providers.
As consumers, we are technology junkies searching for the next great fix, and companies around the world are racing to deliver the coolest new distraction. Sounds great, right? There’s just one problem: companies are working under relentless pressure and impossibly tight deadlines that are quite literally harmful to us, and lead to greater technology risk. Remember that awesome smartphone with the iris recognition system, the Secure Folder security feature, and the battery that had the unfortunate habit of exploding? What about the time Amazon lost hundreds of millions of dollars over a typo? With this never ending demand for newer, cooler technology, many businesses today find themselves sacrificing security and operation in order to release as quickly as possible.
The latest US Department of Defense ‘Red Disk’ data security leak is yet another indicator of how current cybersecurity thinking is entirely out of sync with the broader changes in IT that have taken place over the last 20 years. The explosion of IT systems, networks, users, clouds, and devices has caused the size of the typical enterprise’s attack surface to expand exponentially. Any user or device can be the weakest link and become the steppingstone to a major data breach.
Question and Answer with Michelle Lopilato, the Senior Vice President, Director of Cyber and Technology, Hub International, along with John Farley, Vice President, Cyber Risk, HUB International. Cyber attacks are a reality in today’s age of technology, but that doesn’t mean you have to become a victim when it affects your business. You can stay afloat by arming your start-up/SMB with proactive and reactive cyber security strategies. Tragically, 60 percent of small to midsize companies that suffer a cyber attack are out of business within six months. Don’t make the mistake in assuming that your business is not as susceptible to breaches as large companies. In fact, 55 percent of 600 small and medium sized business (SMB) in a recent survey reported being hacked.
According to IBM Security research, 75% of insider cyber attacks involved malicious intent and 25% involved inadvertent actors. It was also found that the top three industries most under attack are healthcare, manufacturing and financial services, due to the large quantity of personal data, intellectual property, and physical inventory available, as well as massive financial assets, respectively.
NodeSource, the Node.js® company, and Sqreen, a SaaS security monitoring and protection solution, announced the results of a joint developer survey. The survey of nearly 300 CTOs, CIOs and developers revealed that, while the developer community fully understands the risks of operating in the open internet and the complexities of building reliable, secure code, developers are not taking advantage of tools that can identify and mitigate threats.