Monthly Archives: February 2019


Ponemon Institute just released its Challenging State of Vulnerability Management 2019 report.  What can the results of this 600+ cybersecurity leaders and professionals survey teach us about the state of vulnerability management today? In a press release today, Balbix says: Balbix Inc., provider of the security industry’s first system built for avoiding […]

The Challenging State of Vulnerability Management: What Can We Learn ...


What if Sherlock Holmes was a robot?  This question is obviously designed to provoke thoughts on how the integration of automation and investigation could yield some interesting results.  Appropriately, it is being used as the tag line for SecBI’s current marketing campaign.  SecBI’s Autonomous Investigation technology provides automated detection and investigation that […]

What If Sherlock Holmes Was A Robot?


By Tom Piston, Farpointe Data U.S. Eastern Regional Manager For the past several years, there’s been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the United States Federal Trade Commission (FTC) […]

Eliminate the Word “Portals” from Mobile Access Control Discussions




By: Darrell Laffoon, CTO of EZShield + IdentityForce Chances are, you or someone you know has been impacted by identity theft and cybercrime — even if they don’t know it yet. The fallout from such a personal intrusion into your most confidential personal information can affect every aspect of your […]

Preventing Cybercrime and Identity Theft in 2019: How to Transform ...


Guest Contributor: Jeremy Moskowitz Last year, Merriam-Webster added the word, “Bitcoin” to its latest version of the authorized Scrabble dictionary game. As the most recognized form of cryptocurrency, bitcoin has become embedded in our vocabulary thanks to the barrage of media stories outlining it ascension to financial investment stardom in […]

Why Bitcoin and Other Cryptocurrencies Spell Trouble for Cybersecurity