CyberSecurity


QuSecure Announces Company Launch with Industry’s First End-to-End Post-Quantum Cybersecurity Solution

QuSecure Inc. has formally launched as the first company to offer an end-to-end, quantum resilient orchestration platform.



Global Phishing Attacks Continue to Dramatically Grow

Global Phishing Attacks Continue to Dramatically Grow

Zscaler, Inc. recently released the findings of its 2022 ThreatLabz Phishing Report that reviews 12 months of global phishing data from the Zscaler security cloud to identify key trends, industries and geographies at risk, and emerging tactics.

Report: 90 Percent of Data Breaches in Q1 2022 Were Cyberattack Related

Report: 90 Percent of Data Breaches in Q1 2022 Were Cyberattack Related

The Identity Theft Resource Center (ITRC), a nationally recognized nonprofit organization established to support victims of identity crime, released its U.S. data breach findings for the first quarter (Q1) of 2022.

Can “Regular” Threat Actors Become Quasi-APTs?

The proliferation of cyber-offensive capabilities has been thoroughly discussed in recent years by academics and think tankers alike.

Building the Future We Deserve – A Cyber Success Story

Building the Future We Deserve – A Cyber Success Story

Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).

Research: Supply Chain Cyber Attacks Continue to Increase

Organizations have an opportunity to reduce their third-party risk by clarifying whether they or their suppliers are responsible for supply chain risk management, according to new global research of 1400 cybersecurity decision makers by NCC Group.

Similarities at Data Centers and Airports

Similarities at Data Centers and Airports

Few sectors face higher regulation and compliance standards in the United States than the aviation industry.

Report Examines Top Healthcare Data Security Threats

Report Examines Top Healthcare Data Security Threats

Protected Harbor, a full-service IT solution and consulting firm, just announced the launch of its latest whitepaper on healthcare cybersecurity. The whitepaper, entitled “2021 Healthcare Data Breach Trend Report” offers readers an insight into evolving healthcare data breach patterns, predictive threats for 2022, and a playbook on how to increase IT durability to stop future healthcare data attacks.

Prepare for the Expected: Mitigating Cyberthreats with Digital Incident Management

Prepare for the Expected: Mitigating Cyberthreats with Digital Incident Management

Cyber criminals are not picky and cyberattacks are inevitable. They will target your organization regardless of industry, revenue, or how long it has been operating. Cyberattacks have been carried out on large corporations and small businesses, in medical and healthcare, education, government, transportation – the list goes on

Banks Need to Act Now to Ensure Post-Quantum Cybersecurity

Banks Need to Act Now to Ensure Post-Quantum Cybersecurity

The Financial Services Industry has long been a lucrative playground for cyber thieves. These days, the push toward a digital banking economy has opened financial institutions to an overwhelming number of new and sophisticated cyberattacks.

Beyond Buzz

Beyond Buzz

Artificial Intelligence (AI), Machine Learning, Deep Learning, and Computer Vision are the latest buzzwords spreading throughout the security industry.

Cybersecurity and Infrastructure Security Agency Issues Advisory Regarding Possible Russian Cyberattacks

Cybersecurity and Infrastructure Security Agency Issues Advisory Regarding Possible Russian Cyberattacks

The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) issued a joint Cybersecurity Advisory titled, “Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology.”

Report: 96 Percent of Companies Continue to Experience Challenges Protecting Data from Insider Risk

Report: 96 Percent of Companies Continue to Experience Challenges Protecting Data from Insider Risk

Code42 recently released its Annual Data Exposure Report for 2022 on Insider Risk. The study, conducted by Vanson Bourne, found that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data from exposure, leak and theft.

National Cybersecurity Alliance and PCI Security Standards Council Issue Joint Bulletin on Ransomware Attack

National Cybersecurity Alliance and PCI Security Standards Council Issue Joint Bulletin on Ransomware Attack

The PCI Security Standards Council (PCI SSC) and the National Cybersecurity Alliance issued a joint bulletin on the increasing threat of ransomware attacks.

Mostly Ignored Cybersecurity Collaboration is Becoming a Reality

Times have started changing for the better in the U.S. cybersecurity world. After years of minimal effort to get together to discuss cyberattacks and breaches and share some pertinent data, big companies and the federal government have finally started to collaborate on mitigating big cybersecurity issues.

Corporate Organizations: Have You Made Your Solutions Permanent?

For a variety of reasons, cybersecurity experts are urging caution as we enter 2022.

Supply Chain Hits Cybersecurity Hard

The unpredictable shortage of goods because of pandemic-triggered supply chain problems is broad: plastic cup lids, woodworking tools, paper goods, and lumber, to name a few.

Balancing Fraud Prevention and Customer Experience

We sat down with Bala Kumar, CPO of Jumio, to discuss balancing the customer and fraud prevention.

Why Hardware-Encrypted USB Drives Are the Best Option for Regulatory Compliance in 2022

Many governments and industries worldwide have mandated that various forms of personal data be protected by encryption while at rest or in transit.

Countermeasure Considerations

Countermeasure Considerations

In a recent report by the World Economic Forum, Building Resilience in Manufacturing and Supply Systems in the COVID-19 Context and Beyond suggests that manufacturers adopt new working models and governing to increase manufacturing resilience.

Featured

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”