SOC 2 defines criteria for managing customer data based on trust principles that every SaaS provider should incorporate as part of its security and compliance initiatives.
Eighty percent of security and business leaders say their organizations are more exposed to risk as a result of remote work.
A cybersecurity researcher discovered that a vulnerability in Hikvision firmware allowed for potential attackers to gain full control of devices without a username or password.
As surveillance systems move to the Cloud and customers become increasingly concerned over privacy, it’s integral integrators take the proper precautions.
The U.S. Cybersecurity & Infrastructure Agency deems single-factor authentication “especially egregious in technologies accessible from the Internet.”
A survey also found only 44% of facility managers have a cybersecurity solution in place to protect their buildings’ OT systems.
A collaboration with Barracuda Networks will initially focus on network and log security monitoring by leveraging Skout XDR.
The vulnerability is in the ThroughTek Kalay network, a protocol implemented as an SDK built into software and networked IoT devices.
The security category is particularly vulnerable — smart cameras, locks and the hubs controlling them are all hacking targets.
Despite the rise in data breaches, IBM did find preventative cybersecurity strategies for both small and large businesses.