Industry Spotlight


Why You Need PAM and VPAM in 2020

As IT and security managers begin to organize and submit their 2020 budget requests, privileged access management (PAM) or vendor privileged access management (VPAM) may be on the list of competing priorities. PAM is a more sophisticated way to handle administrator accounts and other high-level accounts, and VPAM uses the ... Read More

Are Passwords Now Passé?

Originated at the Massachusetts Institute of Technology in 1961, passwords have long been a central component of digital security. But in the nearly 60 years since they were first implemented as a standard safeguard, technological advancements and societal changes have exposed this once-stalwart defense mechanism‘s vulnerabilities. In the decades since ... Read More
quantum computing

Quantum Computing Is Coming: Are You Cyber Ready?

We’ve been hearing about the vast potential of quantum computing for years. With its exponentially superior processing power, this game-changing technology is expected to dramatically transform fields such as medical sciences, machine learning, particle physics, engineering and meteorology. Although widespread adoption is still in the future, 2019 marks a turning ... Read More

Privacy Regs Changing the Face of Cybersecurity

Companies must take a different cybersecurity tack to ensure ongoing compliance with global regulations regarding privacy The regulatory climate around the world is changing rapidly. Scores of new regulations, including the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) and similar laws in other U.S. states, are ... Read More

Privacy: Where Security and Ethics Miss the Mark

Privacy. We all know what it is, but in today’s fully connected society can anyone actually have it? For many years, it seemed the answer was no. We didn’t care about privacy. We were so enamored with Web 2.0, the growth of smartphones, GPS satnav, instant updates from our friends ... Read More

Can Applications Withstand the ZombieLoad Attack?

As if Meltdown, Spectre and Foreshadow were not enough, recently a new critical vulnerability called ZombieLoad has been discovered that affects a series of modern Intel processors. This vulnerability enables a potential attacker to read small pieces of information from various programs running on the same computer, taking advantage of ... Read More
video surveillance

Safely Saving and Securing Video Surveillance Files

Video surveillance and security initiatives encompass a wide variety of components ranging from  CCTV, body cameras and aerial surveillance. The implementation of video surveillance systems is now often a requirement for security, safety, legal and regulatory compliance. Public and private organizations across all industries install and utilize video surveillance systems ... Read More
buffer overflow

5 Buffer Overflow Vulnerabilities in Popular Apps

The 2019 CWE Top 25 Most Dangerous Software Errors lists improper restriction of operations within the bounds of a memory buffer as the most critical weakness that leads to a dangerous vulnerability. According to CWE by MITRE: “These weaknesses are often easy to find and exploit. They are dangerous because ... Read More
Automated Attacks on Web and Mobile Apps

How to Position the Enterprise for Zero Trust Success

“Zero Trust” may seem like a buzzword to some, but it’s a hot topic for a good reason. Most companies inevitably will adopt some form of the security strategy at some point, now that the workforce is evolving to favor remote work and branch offices. This, paired with the explosion ... Read More
hybrid SOC

8 Tips for a Successful Hybrid SOC

When it comes to setting up a security operations center (SOC), be it in-house, completely outsourced or a hybrid of the two, they should revolve around the three core pillars of people, process and technology. SOC is the nerve center that provides visibility to help an organization understand its risk ... Read More