Industry Trends


By Marty Greenlow, CEO, Ensighten Today’s senior executives are under great pressure to transform their organizations for the digital world. Although this digital transformation imperative has been underway for several years now, we’re currently seeing a significant shift within the C-suite when it comes to ownership of these colossal undertakings. […]

The Implications of Shifting Digital Transformation Responsibilities


Ponemon Institute just released its Challenging State of Vulnerability Management 2019 report.  What can the results of this 600+ cybersecurity leaders and professionals survey teach us about the state of vulnerability management today? In a press release today, Balbix says: Balbix Inc., provider of the security industry’s first system built for avoiding […]

The Challenging State of Vulnerability Management: What Can We Learn ...


What if Sherlock Holmes was a robot?  This question is obviously designed to provoke thoughts on how the integration of automation and investigation could yield some interesting results.  Appropriately, it is being used as the tag line for SecBI’s current marketing campaign.  SecBI’s Autonomous Investigation technology provides automated detection and investigation that […]

What If Sherlock Holmes Was A Robot?



By Tom Piston, Farpointe Data U.S. Eastern Regional Manager For the past several years, there’s been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the United States Federal Trade Commission (FTC) […]

Eliminate the Word “Portals” from Mobile Access Control Discussions



Guest Contributor: Jeremy Moskowitz Last year, Merriam-Webster added the word, “Bitcoin” to its latest version of the authorized Scrabble dictionary game. As the most recognized form of cryptocurrency, bitcoin has become embedded in our vocabulary thanks to the barrage of media stories outlining it ascension to financial investment stardom in […]

Why Bitcoin and Other Cryptocurrencies Spell Trouble for Cybersecurity




Financial organizations across the globe are focused on ensuring stringent cyber resilience in the wake of new threats By Matt Tengwall, Vice President and General Manager, Verint Financial organizations across the world face a new risk paradigm; one that encompasses both cyber and physical threats, such as ATM skimming, identity […]

Keeping an Eye on Cybersecurity




Some of the more fascinating aspects of recent global security developments, including but not limited to GDPR, are the advances in encrypted communications that are now being introduced to the enterprise market. While encryption has long been used by militaries and governments to facilitate secret communication there are now more […]

Encrypted Team Messaging – Why, Where, and When



43 Percent of Firms Do Not Know if Devices Accessing Corporate Data Have Downloaded Malware Bring your own device (BYOD) is a hot topic among cybersecurity professionals and business leaders. Today’s workers, particularly millennials, require the mobility to work from wherever they are and cloud solutions are enabling an ever-growing […]

More Than Half of Companies See Rise in Mobile Security ...