2024: The year of upticks in cyber warfare

2024: The year of upticks in cyber warfare

Historical trends over the past decade prove that when global conflicts arise, it’s inevitable that we’ll begin to see widespread cyberattacks shortly thereafter. This has been the case during the recent happenings between Russia and Ukraine, and Israel and Gaza. At the beginning of each crisis, we witnessed an immediate uptick in cyberattacks worldwide in areas such as DDoS, API and DNS attacks. Following the Iranian missile strike in April, we have already seen and…

Read More

AI hits prime time for physical security

AI hits prime time for physical security

Artificial intelligence (AI) is many things to many people. For some, it’s the hyped-up future of everything. To others, it’s just big data and analytics in a shiny new box. But regardless of where one falls on the AI spectrum, there’s no denying one thing: AI is causing big changes, and it’s already changing how organizations secure their physical infrastructure. AI does this by sensing when something is outside the normal state-of-affairs, which enables it to…

Read More

Mastering the first step in security management: Get your facts right

Mastering the first step in security management: Get your facts right

Mastering the first step in security management: Get your facts right | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Cybersecurity lessons learned from a bike manufacturer

Cybersecurity lessons learned from a bike manufacturer

Cybersecurity lessons learned from a bike manufacturer | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Being proactive creates a future-proof security strategy

Being proactive creates a future-proof security strategy

Being proactive creates a future-proof security strategy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Why construction sites need proactive security

Why construction sites need proactive security

Why construction sites need proactive security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Healthcare organizations must prepare for looming cybersecurity legislation

Healthcare organizations must prepare for looming cybersecurity legislation

Healthcare organizations must prepare for looming cybersecurity legislation | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

A focus on risk in software supply chain security

A focus on risk in software supply chain security

<!– A focus on risk in software supply chain security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The importance of pentesting and practical steps to build a program

The importance of pentesting and practical steps to build a program

The importance of pentesting and practical steps to build a program | 2021-02-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More