Cybersecurity
Genetec Announces ISC West 2018 Product Lineup
Genetec Inc. announced its plans for ISC West 2018. The company will feature the latest version of Security Center, its flagship unified security platform, and demonstrate Citigraf™, its new decision support system for comprehensive response coordination. Genetec Citigraf is designed to help reduce response time to crimes, and provide insights and analytics on how crime moves across the city, so first responders can take the most effective action with the greatest awareness.
DeWalt & McAlpine Launch Premier Cybersecurity Advisory Firm
Cyber Investing Summit Keynote Speaker Dave DeWalt and Panelist Eric McAlpine have joined forces to launch Momentum Cyber, a new advisory firm dedicated exclusively to the cybersecurity industry. The firm offers a new and innovative advisory model specifically designed for the cybersecurity industry combining operational excellence, board room, corporate finance, strategy, exit planning, and M&A services throughout the life of a client – Incubation to Exit.
PSA Security, ISC Security And SIA To Launch Cyber Secured Forum
PSA Security Network, the world’s largest systems integrator cooperative, ISC Security Events and the Security Industry Association (SIA), the leading trade association for global security solution providers.
Keeping Up With Technology Risk
As consumers, we are technology junkies searching for the next great fix, and companies around the world are racing to deliver the coolest new distraction. Sounds great, right? There?s just one problem: companies are working under relentless pressure and impossibly tight deadlines that are quite literally harmful to us, and lead to greater technology risk. Remember that awesome smartphone with the iris recognition system, the Secure Folder security feature, and the battery that had the unfortunate habit of exploding? What about the time Amazon lost hundreds of millions of dollars over a typo? With this never ending demand for newer, cooler technology, many businesses today find themselves sacrificing security and operation in order to release as quickly as possible.
Expert Speaks On Recent ‘Red Disk’ Security Leak
The latest US Department of Defense ?Red Disk? data security leak is yet another indicator of how current cybersecurity thinking is entirely out of sync with the broader changes in IT that have taken place over the last 20 years. The explosion of IT systems, networks, users, clouds, and devices has caused the size of the typical enterprise?s attack surface to expand exponentially. Any user or device can be the weakest link and become the steppingstone to a major data breach.
8 Cyber Insurance Questions Start-Up and Small Business Owners Are Asking
Question and Answer with Michelle Lopilato, the Senior Vice President, Director of Cyber and Technology, Hub International, along with John Farley, Vice President, Cyber Risk, HUB International. Cyber attacks are a reality in today?s age of technology, but that doesn?t mean you have to become a victim when it affects your business. You can stay afloat by arming your start-up/SMB with proactive and reactive cyber security strategies. Tragically, 60 percent of small to midsize companies that suffer a cyber attack are out of business within six months. Don?t make the mistake in assuming that your business is not as susceptible to breaches as large companies. In fact, 55 percent of 600 small and medium sized business (SMB) in a recent survey reported being hacked.
Most Cyber Attacks Are Inside Jobs
According to IBM Security research, 75% of insider cyber attacks involved malicious intent and 25% involved inadvertent actors. It was also found that the top three industries most under attack are healthcare, manufacturing and financial services, due to the large quantity of personal data, intellectual property, and physical inventory available, as well as massive financial assets, respectively.
60% Of Developers Have Security Concerns
NodeSource, the Node.js® company, and Sqreen, a SaaS security monitoring and protection solution, announced the results of a joint developer survey. The survey of nearly 300 CTOs, CIOs and developers revealed that, while the developer community fully understands the risks of operating in the open internet and the complexities of building reliable, secure code, developers are not taking advantage of tools that can identify and mitigate threats.
Cybersecurity Skills Shortage Impacts Security Operations
According to ESG research, 45% of organizations report having a problematic shortage of cybersecurity skills in 2017. Of course, this applies to all areas of cybersecurity but recent ESG research shows that the skills shortage has a direct impact on security analytics and operations. The research also reveals some of the ramifications of these cybersecurity skills shortages.
Cyber Risk Lessons for Boards and Officers
Large enterprises like Equifax, Target, Sony and Home Depot may have grabbed headlines for cyber attacks, but small to mid-size businesses are the most exposed and the easiest prey. That?s because small businesses have fewer resources and may falsely believe that hackers only target large organizations. Last year, small organizations accounted for 85% of data breach claims, and breaches of less than 10,000 records cost on average $4.66 million.
Spohn Security Warns Of Risks With Cloud Computing Still Emerging
More companies are moving towards cloud technologies for lower costs, faster time to market, and increased employee productivity. However, the vulnerability of common cloud servers creates many new security challenges, the full impact of which we are just starting to determine. Spohn Security Solutions offers advice on catching vulnerabilities and proofing your company against cloud attacks.
Cyberattacks: 59% Of Survey Respondents Say Laptops Are Most Vulnerable Devices
Following a first survey from December 2016, ReportLinker conducted a new research on cybersecurity to find out if opinions and attitudes towards this threat have shifted since last year. Many Americans don?t feel they personally are at much risk of a cyberattack, they are however a large majority to think cyberattacks are becoming more a threat now.
NTT Security Launches Security Services For Industrial Control Systems
NTT Security Corporation, the specialized security company of NTT Group, has launched ?IT/OT Integrated Security Services.? The new services will be taken to market globally through the NTT Group companies, Dimension Data, NTT Communications, and NTT DATA, forming part of its suite of integrated services to enable successful digital transformation initiatives for its clients.
US Government Bans Agencies From Using Russian Cybersecurity Software Over Spying Fears
The US government has banned federal agencies from using Kaspersky Lab security software, a Russian company, over concerns it may be tied to state-sponsored espionage. Acting Homeland Security Secretary Elaine Duke has issued a directive given at least six federal agencies a timeline to get rid of the software from government networks.
Virginia Adopts Cybersecurity Framework To Get Everyone Speaking Same Language
Virginia Gov. Terry McAuliffe declared Thursday that Virginia is the first state to adopt the National Initiative for Cyber Security Education (NICE) Framework, developed by the National Institute of Standards and Technology, in an official capacity. The latest version of the framework —also known as NIST Special Publication 800-181— was published earlier this month with the intention of providing a “common, constant lexicon” for a fast-growing industry in which everyone seems to have a different name for the same thing.
White House Cybersecurity Coordinator Warns Against Using Kaspersky Lab Software
Rob Joyce, the Trump administration’s cybersecurity coordinator, said Tuesday the U.S. is lacking 300,000 cybersecurity experts needed to defend the country. He also had a warning for the public about using software from Kaspersky Lab. U.S. officials believe the company has ties to the Kremlin – and the federal government has vowed not to use its products. FBI agents have also interviewed Kaspersky employees working in the U.S.
HBO Hacked In Latest Cybersecurity Breach
HBO’s computer network struck by ransomware: hackers leak scripts from popular shows like “Game of Thrones” and demand up to $15 million in ransom. HBO reportedly responded with a $250,000 offer. Timothy Crosby, Senior Security Consultant for Spohn Security Solutions, says this newest hack evidences the growing risk that companies face with cyber intrusions. ?No company —large or small— is immune to being a target; the HBO saga makes it even more apparent that cyber security teams must remain vigilant to detect and prevent attacks before they happen,? stated Crosby.
Genetec Announces ASIS 2017 Product Lineup
Genetec, a leading technology provider of unified security, public safety, operations, and business intelligence solutions, announced its show lineup for ASIS 2017 (booth #3147, Kay Bailey Hutchison Convention Center, Dallas, TX). Recognized by IHS Markit® as the only vendor to achieve top market share rankings across multiple security and hardware appliance categories in 2016, the company will demonstrate how its latest innovations help enterprise, transportation, education, government, and retail customers ‘Protect the Everyday.’
Cyber Attacks Occurring More Frequently With Greater Sophistication According To NTT Security
The frequency and sophistication of cyber attacks continues to rise globally according to research data from the Global Threat Intelligence Center (GTIC) 2017 Q2 Threat Intelligence Report released by NTT Security, an NTT Group company. The report, based on events identified across the NTT Security global client base during the second quarter of 2017, identifies trending threats and enables the company to implement IT security assessment and incident response tactics to stay ahead of hackers, and maintain the best protection for their clientele.
Cloud Security, IT Security, Cybersecurity: How To Move IT To The Board Room
Innovations in cloud technology have begun to filter across industries, while cybersecurity remains a pressing and timely issue in this era of hacking. While the topic of cloud security may have a lower budget priority to I.T. organizations than overall IT security, the convergence of topics is here to stay. Since the overarching trend of outsourcing to Cloud Service Providers (CSPs) for specific applications, platform services, or infrastructure has become commonplace, the intersection of cloud security and organizational security has merged. I would argue that the intersection of cloud and enterprise/IT security has become a vital component of a company’s overall cybersecurity posture, and as such, requires careful monitoring.