Cybersecurity

Read: Arcules Emphasizes Dedication to Cybersecurity With SOC 2 Certification

Arcules Emphasizes Dedication to Cybersecurity With SOC 2 Certification

SOC 2 defines criteria for managing customer data based on trust principles that every SaaS provider should incorporate as part of its security and compliance initiatives.

Read: Study: Remote Work Directly Linked to Cyber Hacks

Study: Remote Work Directly Linked to Cyber Hacks

Eighty percent of security and business leaders say their organizations are more exposed to risk as a result of remote work.

Read: ‘Highest Level of Critical Vulnerability’ Found in Certain Hikvision Products

‘Highest Level of Critical Vulnerability’ Found in Certain Hikvision Products

A cybersecurity researcher discovered that a vulnerability in Hikvision firmware allowed for potential attackers to gain full control of devices without a username or password.

Read: 5 Experts Express Role of Standards in Video Surveillance

5 Experts Express Role of Standards in Video Surveillance

As surveillance systems move to the Cloud and customers become increasingly concerned over privacy, it’s integral integrators take the proper precautions.

Read: CISA Adds Single-Factor Authentication to List of Bad Practices

CISA Adds Single-Factor Authentication to List of Bad Practices

The U.S. Cybersecurity & Infrastructure Agency deems single-factor authentication “especially egregious in technologies accessible from the Internet.”

Read: Honeywell: 71% of Facility Managers Worry About Operational Cybersecurity

Honeywell: 71% of Facility Managers Worry About Operational Cybersecurity

A survey also found only 44% of facility managers have a cybersecurity solution in place to protect their buildings’ OT systems.

Read: Vector Security Networks Releases AI-Enabled Cybersecurity as a Service

Vector Security Networks Releases AI-Enabled Cybersecurity as a Service

A collaboration with Barracuda Networks will initially focus on network and log security monitoring by leveraging Skout XDR.

Read: Newly Discovered IoT Vulnerability Could Threaten 83 Million Devices

Newly Discovered IoT Vulnerability Could Threaten 83 Million Devices

The vulnerability is in the ThroughTek Kalay network, a protocol implemented as an SDK built into software and networked IoT devices.

Read: Why the Smart Home Network Has Never Been More Vulnerable

Why the Smart Home Network Has Never Been More Vulnerable

The security category is particularly vulnerable — smart cameras, locks and the hubs controlling them are all hacking targets.

Read: IBM: Pandemic Has Led to More Expensive Data Breaches

IBM: Pandemic Has Led to More Expensive Data Breaches

Despite the rise in data breaches, IBM did find preventative cybersecurity strategies for both small and large businesses.

1 2 3 60
Get Our Newsletters