Ponemon Institute just released its Challenging State of Vulnerability Management 2019 report.  What can the results of this 600+ cybersecurity leaders and professionals survey teach us about the state of vulnerability management today? In a press release today, Balbix says: Balbix Inc., provider of the security industry’s first system built for avoiding […]

The Challenging State of Vulnerability Management: What Can We Learn ...


By Tom Piston, Farpointe Data U.S. Eastern Regional Manager For the past several years, there’s been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the United States Federal Trade Commission (FTC) […]

Eliminate the Word “Portals” from Mobile Access Control Discussions


The convenience of online shopping allows people to buy the things they want through the internet, then get them delivered to their doorsteps days or even hours later. But online shopping’s popularity also caused a rise in “porch pirates,” the thieves who look for packages left outside homes and snatch […]

What the Prevalence of Porch Pirates Says About the Need ...


Guest Contributor: Jeremy Moskowitz Last year, Merriam-Webster added the word, “Bitcoin” to its latest version of the authorized Scrabble dictionary game. As the most recognized form of cryptocurrency, bitcoin has become embedded in our vocabulary thanks to the barrage of media stories outlining it ascension to financial investment stardom in […]

Why Bitcoin and Other Cryptocurrencies Spell Trouble for Cybersecurity



By Itai Weissman, VP Partners Solutions, Allot Consumer cybersecurity needs have significantly changed over the past years. With the rising global dependence on smart devices for everything from waking up in the morning to dimming the lights at night, it is safe to say that smart homes are the new […]

Service Providers Have an Opportunity to Address Consumer IoT Security ...


By: Kayla Matthews HackenProof, an Estonia-based cybersecurity firm, reported recently that it discovered a 73-gigabyte database containing 114 million records of approximately 83 million U.S. citizens and companies sitting unprotected online. The data included information such as first and last name, employers, job title, address, phone number, email, and IP […]

Records of 114 Million U.S. Citizen and Companies Exposed Online


In today’s world of rampant hyperbole and the excessive use of buzzwords, it is often a good idea to define exactly how you are using some terms.  This is especially true when talking about Artificial Intelligence, Machine Learning, or Deep Learning.  More than any others in recent memory, these terms […]

5 Questions You Should Ask Your Security Vendors About Their ...


Financial organizations across the globe are focused on ensuring stringent cyber resilience in the wake of new threats By Matt Tengwall, Vice President and General Manager, Verint Financial organizations across the world face a new risk paradigm; one that encompasses both cyber and physical threats, such as ATM skimming, identity […]

Keeping an Eye on Cybersecurity



Partnership Expands U.K. Business Partner Access to Cobalt Iron’s Innovative Enterprise Data Protection Products and Solutions LAWRENCE, Kansas, and BRACKNELL, Berkshire, U.K. — Feb. 19, 2019 — Cobalt Iron Inc., a leading provider of enterprise data protection SaaS, and Tech Data Corporation, a global technology distributor, today announced a distribution partnership […]

Cobalt Iron and Tech Data Partner to Extend Access to ...


Thomvest leads round with participation from Sinewave, Bain Capital Ventures and Mayfield; new advisory board includes prominent members of security and development community SANTA CLARA, Calif., Feb 12, 2019 – ShiftLeft™ Inc., an innovator in application-specific cloud security, today announced it has raised $20 million in Series B funding. This […]

ShiftLeft Raises $20 Million Series B Funding to Accelerate Adoption ...


By: Darrell Laffoon, CTO of EZShield + IdentityForce Chances are, you or someone you know has been impacted by identity theft and cybercrime — even if they don’t know it yet. The fallout from such a personal intrusion into your most confidential personal information can affect every aspect of your […]

Preventing Cybercrime and Identity Theft in 2019: How to Transform ...


By Don Boxley, CEO and Co-Founder, DH2i (www.dh2i.com)  Regardless of where it originates – commercial, nonprofit, or government agency – data is moving into the cloud at breakneck speed.  One important reason for this is to support today’s increasingly decentralized workforce and its accessibility requirements.  And, not only are workforces increasingly spread-out […]

How Software Defined Perimeter Solutions Can Improve Data Security Over ...