Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Leverage Video Technology for Comprehensive Security Solutions

Video technology in security protocols has come a long way since the old days of black-and-white footage. Those changes transformed video surveillance from a simple observer to an active participant in strengthening business security solutions. With innovations that range from high-resolution images to cloud storage and advanced analytics, organizations are equipped with a reliable tool to aid in privacy control and safety.

How Much Does It Cost to Build a Security Operations Center (SOC)?

Having some form of a security operations center (SOC) to protect and secure your assets, applications, and infrastructure is no longer optional. As cyber criminals grow more sophisticated and modern complexities (remote work, the cloud, international operations) expand the attack surface, a SOC becomes a critical line of defense. It works proactively and reactively and can help an organization advance their security posture while dealing with immediate threats.

What's new in Calico - Spring 2024

Calico, the leading solution for container networking and security, unveils a host of new features this spring. From new security capabilities that simplify operations, enhanced visualization for faster troubleshooting, and major enhancements to its popular workload-centric distributed WAF, Calico is set to redefine how you manage and secure your containerized workloads. This blog describes the new capabilities in Calico.

DFARS 7012 Class Deviation and NIST 800-171 Rev 3 Guidance for DIBs

NIST 800-171 revision 3 was released on May 14, 2024, prompting DoD to issue an indefinite class deviation for DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting (DFARS 7012). US Defense Industrial Base (DIB) contractors must now comply with NIST SP 800-171 revision 2 rather than the version in effect at the time the solicitation is issued, as was previously required.

How to Change Your Wi-Fi Password for Advanced Online Security

Home is where the Wi-Fi is, and where your network can be the target of network attacks. Although many of us know the importance of creating strong passwords to protect our email, social media, online banking, etc., few people apply the same practice to their Wi-Fi passwords. Using the default password provided by your Internet Service Provider (ISP) might seem convenient, but it has risks.

The Interplay of AI and Cybersecurity: Survey Results

Artificial intelligence (AI) has a long and storied history. Ancient Greeks, for example, told stories of Talos, an enormous automaton that stood guard over Crete’s shores. In the 17th century, Gottfried Leibniz, Thomas Hobbes, and René Descartes explored the possibility that all rational thought could be as systematic as algebra or geometry.

The UK's Cybersecurity: Where Is it and Where Is it Going?

In early April this year, the UK's Department for Science, Innovation and Technology (DSIT) released its Cybersecurity Breaches Survey 2024. It provides a comprehensive overview of the UK's cybersecurity landscape, exploring the different cyberattacks and cybercrimes businesses, charities, and private sector educational instructions face, the impacts on these organizations, and how they respond. The report is a valuable resource for the cybersecurity community.

How Can AI Be Used to Combat Phishing Attacks

Phishing is not going away—it’s morphing and evolving. As an example, in late 2022 the overnight commodification of artificial intelligence (AI) changed the phishing threat landscape forever, lowering the barrier to entry for novice fraudsters who had previously had the motives, but lacked the means to launch sophisticated scams. ChatGPT and fraud-specific Generative AI tools (like the aptly named FraudGPT and WormGPT) granted malefactors the ability to supercharge and scale their operations.

Network Security and Application Security: The Power Duo of Cybersecurity

In a world with frequent technological changes, maintaining the trustworthiness and protection of your data and systems should be of paramount importance. With technology constantly evolving for the better, dangers and susceptibility could also make your online security more extraordinary. This is where the issues of network security and application security appear, which may be referred to as two complementary subtopics.

Accelerating Cybersecurity in the Transportation Industry

The transportation industry is not only part of critical infrastructure, but at the nexus of other critical infrastructure sectors that rely on transportation systems to operate reliably. When threat actors put this fundamental function at risk, there’s a ripple effect that disrupts individuals, businesses, government and supply chains.