CyberSecurity


Learning to be a Strategic Skeptic: Promoting Critical Thinking, Digital Literacy

Research from the National Skills coalition (NSC) suggests that 92% of today’s jobs require digital skills. It’s frankly hard to believe that figure isn’t at 100 percent. Businesses of all kinds are significantly impacted by applications that manage all sorts of transactions internally and externally. The capture, storage, and use of data is prolific across all industries—and subject to increased risk of unauthorized access and cybersecurity breaches.



Trust But Verify

Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks.

Research: 12 Percent of CISOs Faced Budget Reductions in 2024

IANS Research and Artico Search recently unveiled the 2024 Security Budget Benchmark Report, offering critical insights into the state of security budgets and staffing amidst a backdrop of global economic challenges. This comprehensive study compiled findings from the fifth annual CISO Compensation and Budget Research Survey, including responses gathered from over 750 Chief Information Security Officers (CISOs) between April and August 2024. The report indicates a cautious yet necessary expansion in security spending.

Scam Sites at Scale: LLMs Fueling a GenAI Criminal Revolution

Cybercrime groups, like other businesses, can create more content in less time using GenAI tools. Over the last 6 months, Netcraft identified threat actors using these technologies across a range of attacks, from innovating advance fee-fraud to spamming out the crypto space. In total, our observations show LLM-generated text being used across a variety of the 100+ attack types we cover, with tens of thousands of sites showing these indicators.

Unlocking the End-user Perception

An observation as a creator of identity verification solutions is that while industry leaders are often excited by the opportunity to leverage biometrics, there are often concerns raised about the end-user mindset during the conversation. Primarily, what are end-users’ expectations of biometric technology? What concerns might they have about its usage to authenticate and protect their access?

Report Shows a 56 Percent Increase in Active Ransomware Groups in First Half of 2024

Searchlight Cyber has released its latest report, revealing key ransomware trends for the first half of 2024. Ransomware in H1 2024: Trends from the Dark Web showcases how the ransomware scene has shifted since the release of its annual ransomware report 2024 at the start of the year. The report offers key insights drawn from dark web intelligence to help organizations bolster their defenses against emerging threats.

5 Reasons for Outsourcing Your SOC

The cyber threat landscape is constantly changing, so now more than ever, it is important for your business to have a technologically advanced Security Operations Centre (SOC).

SEC Awards Three Collegiate Scholarships for 2024-2025

The Security Executive Council has awarded three $2,500 scholarships to students of excellence at its partner academic institutions, which are recognized for their outstanding programs in security, risk, and intelligence.

Building the NaaS Experience: Connect, Innovate, Transform at MEF’s Global Event

MEF’s Global Network-as-a-Service (NaaS) event (GNE) in Dallas, Texas 28-30 October brings together the entire NaaS ecosystem to discuss the vision of a new generation of NaaS and provide a snapshot of the industry for service providers, technology vendors, wholesale providers, retail providers, hyperscalers, system integrators and of course, the end-user enterprise community.

Into the Breach: Why Employees Remain the Achilles Heel

The past half decade has seen culture and flexibility springboard to the top of employees’ priority lists. As a recent survey conducted by job site Monster shows, 26% of U.S. workers would alarmingly rather get a root canal than work in the office five days a week, while 38% stated that they would consider quitting their jobs if they were told that they had to work in the office just one day a week.

Manufacturing is Top Targeted Industry for Cybercrime So Far in 2024

Critical Start, a provider of in Managed Detection and Response (MDR) cybersecurity solutions and a pioneer in Managed Cyber Risk Reduction (MCRR), recently released its biannual Cyber Threat Intelligence Report, featuring the top threats observed in the first half of 2024, and emerging cybersecurity trends impacting the manufacturing, healthcare, technology, professional services, engineering, and construction industries. The report also includes actionable insights to help organizations strengthen their security posture and proactively mitigate potential cyber risk.

72 Percent of Senior Executives Targeted by Cyberattacks in the Last 18 Months

Senior executives are prime targets for cybercriminals, with a staggering 72% of surveyed cybersecurity professionals in the US reporting that this group has been targeted by cyberattacks in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybersecurity Report, underscores the growing sophistication of attacks, including the rising use of AI-generated deepfakes, which have been involved in 27% of the attacks.

Government Sector Hit Hard By Ransomware Attacks According to New Report

ExtraHop recently released its global ransomware trends report, a data-driven analysis of ransomware impacts across geographies, industries, and organizations of different sizes.

Survey: More Than Half of IT Security Professionals Are Concerned About AI-Powered Threats

Pluralsight recently released results from a survey that polled over 200 technologists about cybersecurity and AI. The findings show that 56% of security professionals are concerned about AI-powered threats. Additionally, the survey explores the top cybersecurity skills in today’s tech landscape and emerging cybersecurity roles.

Cybersixgill Introduces Pulse: Disrupting Cyber Threat Intelligence with Personalized Content Stream

Cybersixgill, global cyber threat intelligence (CTI) data provider, announced today Cybersixgill Pulse, revolutionizing how threat analysts and security practitioners consume and act upon cybersecurity threat intelligence. Pulse is the first such offering that delivers personalized, streamed CTI content, individualized to each user according to relevance, usage patterns, interests, sector, and geography.

Safe's Newly Appointed Channel Chief To Aggressively Pursue $4 Billion Third-Party Cyber Risk Business

Safe Security, provider of AI-driven cyber risk management, announced today the appointment of Michael Nagao as Senior Vice President (SVP) of Worldwide Channel Sales and Alliances. Before joining Safe Security, Michael was Area Vice President - America's Channel for Rubrik, Inc., where he played a leadership role in delivering $800m + ARR channel business. Michael is leading the charge for Safe Security's drive to build a 100% channel first business.

Supply Chain Vulnerabilities: Addressing Cybersecurity Risks in Manufacturing Networks

Manufacturing networks are complex and interconnected, involving numerous stakeholders from suppliers to customers. This interconnectedness, while beneficial for efficiency, also introduces multiple entry points for cyber threats. As the manufacturing industry continues to embrace digitization, the need to secure networks becomes increasingly important.

Help Your Customer Protect Themselves

In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information.

Computers Beginning to Come Back Online After CrowdStrike Caused Crash Friday

Computers around the world are beginning to come back online after a defective update to Windows machines from cybersecurity provider CrowdStrike Friday affected almost 9 million machines.

Global IT Outage Cause by Faulty Update from Cybersecurity Provider CrowdStrike

Systems are starting to come back online after a global IT outage on Friday disrupted everything from airline operations to banks and 911 call centers.

Featured

  • 2024 Security Today New Product of the Year Award Winners Announced

    More than 20 companies are being recognized this year for products that help keep us safe. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3