In August of this year, BSM posted an article outlining a conversation we had with Saumitra Das, CTO at Blue Hexagon. This piece, entitled When You Live and Die by the 1-Second Rule, examined an announcement from Blue Hexagon that introduced an industry-first ability to detect and stop, in real-time, […]

Deep Learning Solution Earns Perfect Score in Threat Protection Test


By Greg Young, Vice President of Cybersecurity at Trend Micro DevOps is the new engine for global business growth. All over the planet, organizations are becoming more responsive to changing market demands thanks to the roll-out of agile, automated development processes. Yet there are challenges. Cybersecurity remains the number one […]

Securing DevOps: Why Culture is Key to Driving Company-Wide Success


Each year, cybersecurity companies publish a number of research reports focusing on different aspects of cybersecurity and breach trends. A big shout-out to Brittney Regalado of 10Fold Communications for sending over the below list of some of the most alarming statistics from 2019 reports, just in time for Halloween. Arkose […]

Scary Security Stats


In cybersecurity breach de jour news it seems that a popular mobile social game company, Zynga Inc., was recently breached and gave up information on more than 218 million users.  While the breach itself was quietly announced by Zynga on September 12, 2019, they offered precious few details.  The story […]

Popular Game Company Zynga Breached



For most users – business or personal – price should not be the sole determining factor when it comes to choosing a backup storage provider.  You are backing up your data for a reason. Your data is important to you. That being said, there are few things as satisfying as […]

Backing up Your Data Is Critical for Security but How ...


On September 18, 2019, Trend Micro reported that they discovered a series of incidents where the credit card skimming attack Magecart was used to hit the booking websites of chain-brand hotels.  In their renowned Security Intelligence Blog they stated, “In early September, we found two hotel websites (from different hotel […]

Magecart Skimming Attack Targets Hotel Booking Websites


Having an employee download malware from a seemingly reputable website or fall prey to a well-crafted phishing campaign are pervasive threats for today’s employers.  More and more often it appears that the technical ability of the bad actor is keeping pace, or even outpacing, our ability to stand up effective […]

How to Safely Browse the Internet Without Worrying About Downloading ...


At the recent GSX Conference in Chicago, we ran across a very interesting security solution that nearly all of us have used dozens, if not hundreds, of times but may not even be able to name the manufacturer.  One of the most maligned and complained about security products ever, but […]

ScanVan: Random and Portable Screening Capabilities



Free webinar on campus reporting procedures being offered on September 19 Montreal, September 4, 2019 – Montreal-based TrackTik, the leading workforce management solution for physical security, is pleased to announce its sponsorship of Clery Center’s National Campus Safety Awareness Month (NCSAM) 2019.  NCSAM originated in 2008 following unanimous congressional support for increased […]

Security Technology Leader TrackTik Announces Partnership with Clery Center to ...


New York, New York—​Vaion, just a few months out of stealth mode, today announces its launch into the North American market with comprehensive demonstrations at​ ​GSX 2019​. Vaion will exhibit in booth #1819 with a rapidly expanding commercial team ready to provide custom demos. Visitors will examine real-world scenarios which […]

Vaion is Gaining Momentum – See Why at GSX 2019


By Mr. Shomiron Dasgupta, CEO and Founder, DNIF Cyber threats have been prevalent on the internet for decades now. Unfortunately, malware has been evolving more rapidly than the anti-malware software needed to combat it. The three most active cyber threat categories worldwide are currently ransomware, phishing, and endpoint attacks. Ransomware […]

Top 3 Cyber Threats and their analysis


by: Moshe Elias, Director of Product Marketing, Allot IoT connectivity is the new way of life. From smart printers and televisions to lamps and baby monitors, the use of IoT devices continues to trend up each year. However, the popularity of these devices is no indicator of their safety. In […]

The Commonality of the Brute Force IoT Attack