As we move past an unprecedented year of change, everyone is eager to see what 2021 has in store. For those in the security and surveillance space, of particular interest is how video content analytics might evolve to support emerging use cases. In that vein, Deep Learning and Predictive Analytics are among the key technologies that will continue to benefit video surveillance solutions development and adoption in 2021 - here's why.
Social media campaigns designed to spread false information about companies is a growing issue and will soon be a top-level concern for security professionals and executives in every industry. With misinformation on the rise, here are a few things CSOs and their teams can start doing today to prepare.
The 10th Allianz Risk Barometer 2021 survey reports potential disruption and loss scenarios companies are facing; this year's top three business risks all relate to the coronavirus pandemic: business interruption (#1 with 41% responses); pandemic outbreak (#2 with 40%) and cyber incidents (#3 with 40%).
In September 2020, a ransomware attack forced 6,000 elementary students to shutdown learning at the Newhall School District. Newhall isn't alone. In addition, Harford Public School, Miami Dade County, Haywood County School district in North Carolina are others that experienced similar circumstances. With ransomware surging nearly 110% and no end in sight for remote learning, the environment is ripe for cyberattacks to escalate. To get some insight, we spoke to Dmitriy Ayrapetov, Vice President of Platform Architecture at SonicWall.
In legal professions, safeguarding documents and paperwork is an essential office task. These papers may contain important, private information about a company’s operations, or they may include other privileged information shared by clients concerning their cases. In an increasingly digital world, the lock and key of the filing cabinet are no longer enough to guarantee document security. How can your practice better protect the digital files it stores? Take a moment to consider these six tips for implementing better security surrounding these important documents.
One thing that makes hospitals more vulnerable today than in the past is the extraordinary increase in connected medical devices (often known as IoMT or the “Internet of Medical Things”). Network-connected medical devices make healthcare more efficient and enable better patient care. They range from simple blood pressure devices and infusion pumps to more complex machines such as MRIs, CT scanners, and ultrasounds. The obvious problem is that these network connections also make these devices vulnerable to attack.
Microsoft has addressed companies who have not yet updated their systems to address the critical Zerologon flaw, a vulnerability in the cryptography of Microsoft's Netlogon process that allows an attack against Microsoft Active Directory domain controllers, making it possible for a hacker to impersonate any computer, including the root domain controller.
The National Security Agency (NSA) has released an information sheet with guidance on adopting encrypted Domain Name System (DNS) over Hypertext Transfer Protocol over Transport Layer Security (HTTPS), referred to as DNS over HTTPS (DoH). When configured appropriately, strong enterprise DNS controls can help prevent many initial access, command and control, and exfiltration techniques used by threat actors.
Finding and implementing a cybersecurity risk framework is a challenge every organization faces. Time has shown that this endeavor almost always calls for the heavy lifting to be carried by chief information security officers (CISOs) and their staff. So where do you start?