Future of the SIEM

Read Kelly Sheridan explain the future of security information and event management (SIEM) systems on Dark Reading : Ask security experts about security information and event management (SIEM) systems, and many will tell you SIEMs are becoming dated and need to be revamped. The skepticism is understandable. How can SIEM, a multi-billion-dollar market around for many years, […]

Convergence Q&A: Project Management for the 21st Century

Electronic physical security systems are built using information technology. So, an IT project manager with an excellent track record would seem to be in a good position to manage a physical security system deployment project. Read the Q & A with Ray Bernard of Ray Bernard Consulting Services (RBCS) who talks about security convergence in project […]

Physical Security Continues to Move to the Cloud as Concerns Wane

Physical security applications, like video surveillance and badge scanning, continue to migrate to the cloud, with 57% of respondents believing the cloud is a cyber-safe environment for these kinds of operations. Read about the new study by Schneider Electric which reveals that nearly half of respondents indicated that they already run security applications in the […]

CeBIT 2017: Security Chiefs Warn of Executive Security Disconnect

A group of European security luminaries has told an audience at today’s CeBIT conference that companies must move quickly to avoid cybersecurity disasters–and that executives and CFOs are often unaware of the imminent threat posed by hackers. Read more about why experts believe that there is a growing disconnect between executives and CFOs about cyber […]

New Yorkers See 60% Rise in Data Breaches in 2016

An analysis conducted by the New York Attorney General’s (AG) office reveals a 60% increase in data breaches in New York in 2016. This resulted in 1.6 million personal records exposed, three times the amount exposed in 2015. Main causes of the 1,300 reported breaches included hacking (40%) and negligence (37%). Read about the analysis […]

Emerging Tech Creates Cybersecurity Solutions, Threats

Read why Daniel R. Stoller says that emerging threat creates cyber security solutions but also creates new cyber threats on Bloomberg BNA : Companies must understand that artificial intelligence, quantum computing and other new technologies bring both opportunities and collateral cybersecurity threats, panelist and lawmakers said at a March 22 Senate hearing. Read his full article […]

Here are the top 6 ways websites get hacked, according to Google

In 2016, the number of hacked websites rose by 32%, according to a recent blog post from Google. And, unfortunately, the search giant said it believes that number will continue to rise as hackers become more sophisticated. Read about the top six ways in which any website gets hacked according to Google on Tech Republic.

Security Testing Should Be The Highest Priority For The Internet Of Things

Read why y David Bolton says that security testing should be the top priority for Internet of Things on Arc Blog : Companies that integrate Internet of Things solutions into their working practices must make testing a priority, especially if they want to reduce the chances of a security breach. A recent report by global consulting firm […]

Cyber security threats aren’t just for IT departments to manage

Read why Duncan Tait says that cyber security isnt just for IT departments but for all employees of an organisation on Real Business : As it stands, cyber security threats are perhaps the greatest risk facing businesses the world over. Just this month, it was reported that Verizon has lowered its bid for Yahoo by $350 million […]

Insider threat health data breaches doubled in February, Protenus says

The number of healthcare security breaches caused by insiders doubled from January to February, according to the latest Protenus Breach Barometer. While both January and February had the same number of total breaches — 31 apiece, February saw a 47 percent drop in affected patient records. Read about the new Protenus Breach Barometer report which reveals […]