IncMan Security, Orchestration, Automation and Response Platform Cited for Ability to Increase Revenues, Lower Operational Costs and Deliver More Value BOSTON and MILAN — July 9, 2018 — DFLabs, the pioneer in Security Automation and Orchestration, today announced its IncMan SOAR platform is profiled in a new report by 451 Research for enabling […]

451 Research Report Says DFLabs Provides MSSPs a Holistic View ...

Findings were reported today by HelpNet Security that  3,000+ mobile iOS and Android apps are potentially leaking PII data from unsecured Firebase databases.  So far, affected apps have been downloaded 620 million times for Android devices (the iOS download rate is unknown). Researchers with Appthority say 62% of enterprises are likely impacted by […]

3,000+ mobile apps leaking data from unsecured Firebase databases – ...

Business continuity is a concept that refers to the planning and preparation to make sure a company overcomes serious incidents or disasters and resumes its normal operations within a short period of time. This concept includes the following key elements: Resilience: critical business functions and the supporting infrastructure must be […]

Business Continuity Plans for Banks

Guest Contributor: Arturo Maqueo, Regional Sales Engineering Director LATAM, Flexenclosure The security of data – and in particular people’s personal data – has been a hot topic in recent months. The EU’s rollout of new GDPR regulations; the Cambridge Analytica scandal; or the seemingly weekly revelations of financial institutions or consumer […]

For Ultimate Data Center Security, Technology Alone is Not the ...

Big business loves big data.  Data is the fuel needed for today’s enterprise to move forward or to change direction.  Video is simply more data.  As security video has moved away from analog streams stored on tapes toward the ones and zeros more familiar to data analysts, businesses have been eyeing video […]

Cloud Video as a Service for Visibility into your Connected ...

There are likely some in the security industry that still believe that “a drive is a drive is a drive” when it comes to video surveillance storage.  Not so, if you ask the manufacturers of hard disk drives (HDD). Those systems integrators that are a little more “long in the […]

Purpose-built Drives for Video Surveillance

Another day, another announcement regarding a huge data breach.  It seems the current challenge is to resist becoming desensitized to these all-too-common headlines.  If we give up and accept this as our new normal, we lose and the bad guys win.  Luckily, there are dedicated cybersecurity experts who remain vigilant […]

MyHeritage Breach – What the Experts Are Saying

Electronic access control systems do a great job of restricting access through openings that are designed to be used by your employees and vendors.  No valid card, no entry.  But, for many organizations, that is not where most people enter their facility.  It’s the main lobby or other public entrances […]

From Access Control to Visitor Management – What Super Enterprises ...

Guest Contributor: Kim Crawley, Cybersecurity Journalist On May 15th, Amnesty International released a fascinating report, Human Rights Under Surveillance: Digital Threats Against Human Rights Defenders in Pakistan. The report details how Pakistani activists are being targeted by cyber attacks. If you are neither Pakistani nor Indian, you might not know a lot about Pakistani-Indian […]

Pakistani Activists are being Targeted on Facebook

With cybercrime on the rise and costs associated with breached data and business interruption growing, businesses cannot simply afford to ignore the importance of having a solid cybersecurity plan for their organization. In the past recent years, cybercriminals have become more sinister and now use more advanced and sophisticated attack […]

Biggest Global Cybersecurity Trends in 2018

If you are an infosec practitioner it is pretty clear that you are in the data business. After all, your whole world revolves around gathering, understanding, manipulating, and protecting data. If you are a physical security practitioner, on the other hand, it may not be as obvious that your world […]

Are You in the Security Business or the Data Business?

Top of mind for security professionals, given today’s increasingly hostile threatscape, is the mass casualty incident.  Everything from what we can do to reverse this cultural trend toward violence to how we should react in the event of such an incident must be considered.  In times of crisis, seasoned security […]

Tools for Averting a Mass Casualty Threat

You may have missed it but there was a very exciting first that happened in the world of autonomous drones used for security this week.  On Monday, May 21st, Italian electricity and gas giant Enel announced that its Torrevaldaliga Nord power plant deployed an innovative system that uses drones to support the […]

Automated Drone System Deployed at a Power Plant – This ...

It’s very possible that you have spent your entire career in the building electronic security business and never associated UL with anything other than that little UL-in-a-circle sticker that shows up on electronic system components.  Or, you may have spent your entire career in the IT security world and have […]

UL and Cybersecurity – Who Knew?

CheckPoint Tours and ScanPass® Mobile Credential integrations add new offerings for dealers. Customers want services. Services that add convenience, simple control and easy management of all their security devices. With Connect ONE® by Connected Technologies LLC it’s easy to add the new services you may not have thought about or […]

Connect ONE® Makes it Simple to Add All the Services ...

Parcella will lead WISP’s Marketing, Social Media and PR efforts; Next CMD+CTRL cyber range training for WISP members set for July 17 Wilmington, MA – July 13, 2018 – Security Innovation, a pioneer in software security assessment and training, today announced that Lisa Parcella, the company’s Vice President of Product Management and […]

Security Innovation’s Lisa Parcella Elected to Management Team of Women ...

Austin, Texas, July 10, 2018 — Pivot3, the hyperconverged infrastructure performance and technology leader, today announced Caesars Entertainment EMEA has deployed Pivot3 HCI to ensure robust protection of critical video surveillance data, and to future-proof its IT infrastructure to support a wider range of workloads.   Pivot3 unifies storage, compute and virtualization […]

Caesars Entertainment EMEA Deploys Pivot3 Hyperconverged Solutions to Increase Data ...

Guest Contributor: Gary Hayslip, CISO Six Fundamental Precepts for the Modern CISO Role I remember growing up as a kid there was this bookstore near my house called The Cobblestone Bookstore. It was family-owned and in a strip mall. They had a section in the back of the store that was […]


While it’s easy to worry about large outsider threats, which are often the subject of high-profile news stories, threats from people already inside your organization are just as dangerous — often, even more so. Insider threats can come from anyone, ranging from ex-employees with a malicious vendetta to content current […]

Is Your Company’s Biggest Cybersecurity Threat Already on the Inside?