An e-book from IDIS, "Utilizing Video Technology to Overcome Challenges in North American Brick-and-Mortar Retail," identified uses for video surveillance and analytics in retail organizations.
Researchers at Cleafy discovered a version of SOVA that appears to be targeting more than 200 mobile applications, including banking apps and crypto exchanges/wallets.
The BlackBerry Cyber Insurance Coverage study surveyed 450 information technology (IT) and cybersecurity decision-makers about their cyber insurance coverage and ransomware protection levels.
As GSX nears, Security magazine has a roundup of some of the security products, technologies and services that security management professionals may discover at the event.
Access control, weapons detection and visitor management systems are just some of the security technologies helping to prevent healthcare workplace violence.
Default security configurations, weak passwords and human error are the top vectors for cyberattackers targeting enterprise networks. Penetration testers share how to avoid these cyber risks.
For chief information security officers (CISOs) and their organizations, the question is not if the cybersecurity budget should be cut. It's how much risk they are willing to take.