Cyberattacks are becoming easier to carry out and will threaten the digital economy unless businesses innovate Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades. That’s a bold statement, but not without warrant. Cybercrime represents one of the fastest-growing categories of crime in […]

Cybersecurity 2020: Innovate or Surrender


By Robin Tandon, Director of Product Marketing, Cloud Solutions, HID Global The way ID cards are used in the enterprise and on college and university campuses has changed dramatically in recent years.  Once a simple identification tool, corporate ID badges now provide the means to open doors and access IT […]

ID Card Issuance Moves to the Cloud


New account fraud has more than doubled since 2014, despite a seasonal decrease during 2019 Black Friday/Cyber Monday weekend This week Jumio, the leading AI-powered trusted identity as a service provider, unveiled their third edition of the Holiday New Account Fraud Report. The foremost takeaway of the report is that account […]

Happy Holidays 2019 Brings a 28% Increase in New Account ...


STEALTHbits Technologies, a leading cybersecurity software company, has appointed several new executives to support strong demand for its award-winning data access governance, active directory security and privilege access management solutions. Gerrit Lansing joins as Field CTO, Ralph Martino joins as Vice President of Product Strategy for Data Access Governance, and […]

STEALTHbits Executives Added to Support Growth



TrackTik’s new, first-of-its-kind Advanced Break Management solution gives security organizations peace of mind by making it easier to comply with changing break rules and legislation – and reduce legal and financial risk – while simultaneously increasing workforce flexibility and guard productivity. Powered by TrackTik’s Back Office Suite, this breakthrough solution […]

First-of-its-Kind Break Management Software by TrackTik


By Jascha Bryce Almost everyone puts a premium on cybersecurity these days. From average Joes to small and medium enterprises, to multinational companies, people have made a concerted effort to protect their online identity. In essence, Generation X paved the way for the evolutionary process of Internet security. This demographic […]

The Next Generation of Cyber Security Pros: Is Gen Z ...


As everybody becomes more dependent on internet connectivity for work, recreation and socialization, we inevitably increase our risk of digital foul play. Below is a look at five industries that are especially susceptible to cybersecurity threats. Thankfully, they’re also well-positioned to make “cybersecurity 2020” a top priority through cultural and […]

5 Industries Doubling Down on Cybersecurity in 2020


Let’s face it, it is rare to find exciting innovation from the security industry’s big-dog conglomerates.  We usually expect change to be incremental and without surprise from these industry behemoths while the startups more commonly provide noteworthy new ideas, technologies, and solutions.  This is why we walked away from a […]

Innovative Ways of Harnessing Data to Manage Security Threats



While we are all aware that businesses and individuals are subject to identity theft in increasing numbers, did you know that child identity theft is also on the rise? Why is this happening? Children’s credit histories are often blank slates, and fraudsters may be able to get away with stealing […]

Preventing Identify Theft Is Not Child’s Play


Cities, factories and consumers are coming to rely on IoT technology. While it allows for the collection and use of huge amounts of data, it also creates new massive security risks. These devices aren’t always properly shielded against electromagnetic interference (EMI) and radiofrequency interference (RF interference or RFI) — whether […]

RF Interference and Security: 4 Things to Know


In August of this year, BSM posted an article outlining a conversation we had with Saumitra Das, CTO at Blue Hexagon. This piece, entitled When You Live and Die by the 1-Second Rule, examined an announcement from Blue Hexagon that introduced an industry-first ability to detect and stop, in real-time, […]

Deep Learning Solution Earns Perfect Score in Threat Protection Test


By Greg Young, Vice President of Cybersecurity at Trend Micro DevOps is the new engine for global business growth. All over the planet, organizations are becoming more responsive to changing market demands thanks to the roll-out of agile, automated development processes. Yet there are challenges. Cybersecurity remains the number one […]

Securing DevOps: Why Culture is Key to Driving Company-Wide Success