In the security industry, technology is moving at lightspeed. New devices, automation, custom software, and robot and drone technology is constantly being developed, improved upon, and employed to help security guards perform routine tasks. However, to reap the benefits of rapid development and deliver exceptional results, the security industry needs to embrace all of these technological changes and be able to spot trends in order to protect an organization's data and to ensure the safety and wellbeing of its security workforce.
Fast forward to 2020, and the pandemic is causing another quantum shift in how the world thinks about security. This time around, businesses are responsible for protecting their workplaces and people from an invisible intruder. As SARS-CoV-2 continues to disrupt businesses and economies, video intercom systems are once again on the frontline of security. But this time, the intercom has the force of modern technology on its side.
Vectra released its 2020 Spotlight Report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks.
Vectra released its 2020 Spotlight Report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks.
The Department of Justice announced it has awarded more than $87 million to bolster school security, support first responders who arrive on the scene of a school shooting or other violent incident, and conduct research on school safety.
Microsoft has taken action to disrupt a botnet called Trickbot, one of the world’s most infamous botnets and prolific distributors of ransomware. Trickbot has infected over a million computing devices around the world since late 2016.
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a joint cybersecurity advisory regarding advanced persistent threat (APT) actors chaining vulnerabilities — a commonly used tactic exploiting multiple vulnerabilities in the course of a single intrusion — in an attempt to compromise federal and state, local, tribal, and territorial (SLTT) government networks, critical infrastructure, and elections organizations.
Data from 25,000 small-to-midsize organizations reveals ransomware as the top cyber insurance incident in the first half of the year, with the average ransomware demand increasing 100% from 2019 through Q1 2020
October 13, 2020
Coalition announced the results of its H1 2020 Cyber Insurance Claims Report. The report explores top cybersecurity trends and threats facing organizations today, in addition to data showing the impact of COVID-19 on cyber insurance claims. The report garners insights from the incidents reported across 25,000 small and midsize organizations.
Ahead of Amazon Prime Day, a highly-anticipated two-day online event, Bolster Research analyzed hundreds of millions of web pages and tracked the number of new phishing and fraudulent sites using the Amazon brand and logos. T
BlackBerry released new research highlighting the true reach and sophistication of one of the most elusive, patient, and effective publicly known threat actors – BAHAMUT. In the report, BlackBerry researchers link the cyberespionage threat group to a staggering number of ongoing attacks against government officials and industry titans, while also unveiling the group’s vast network of disinformation assets aimed at furthering particular political causes and hampering NGOs.