Information Security

The SecurityInfoWatch.com Information Security product category is a collection of news, product listings and other resources for security professionals researching Information Security solutions. It covers a wide variety of network security hardware and software products.
Credit: Douglas Rissing
The Pentagon is expected to release a new assessment to evaluate and approve zero trust standards in early 2025.
Information Security

How the DOD is enabling its Zero Trust mission

Jan. 10, 2025
Bridging strategy and culture in the Pentagon aims to advance Zero Trust to secure data and support mission success by 2027.
Credit: BeeBright
Every company needs to follow defined planning cadences to set a rhythm for the business, such as the fiscal year, financial audits, board meetings, and other activities that may trigger related planning activities.
Security Executives

How to plan for strategic cyber risk management

Dec. 6, 2024
CISOs can optimize their cybersecurity programs and budgets by quantifying cyber risks in monetary terms and prioritizing risk mitigation based on impact and ROI.
Credit: Dragos Condrea
Salt Typhoon’s operations are characterized by sophisticated tactics aimed at persistent access to their targets. They exploit vulnerabilities in public-facing systems, including routers and firewalls, and leverage compromised credentials to escalate privileges and move laterally within networks.
Breach Detection

Chinese hackers continue to torment U.S. telecommunication companies

Dec. 4, 2024
These continued Salt Typhoon attacks threaten the nation’s critical infrastructure and national security.
Credit: JustSuper
Cloud detection and response (CDR) is a security approach specifically designed for cloud environments that focuses on threat detection, immediate incident response and service integrations.
Cloud Security Solutions

Why visibility alone isn't enough in cloud security

Dec. 4, 2024
To truly protect cloud environments, businesses must move beyond fragmented solutions.
Creative #: 2164249606
gettyimages2164249606
Cybersecurity

From cockpits to code: Aviation’s lessons for enhancing cybersecurity

Dec. 4, 2024
There is a real tailwind across the industry with security executives and technology providers leaning into a measured cybersecurity approach.
Credit: Just_Super
Cybercriminals are no longer limited to sending malicious emails and texts. They’re making direct, human-to-human contact, catching even the most cautious off-guard.
Cybersecurity

How callback phishing threatens our online safety

Dec. 2, 2024
The new face of phishing continues to shift and grow; awareness remains our best defense.
Credit: NoSystem images
As cyber threats become more targeted and sophisticated, finance departments face many new security challenges, beginning with financial processes.
Security Executives

It’s time for CFOs to saddle up to the cybersecurity table

Dec. 2, 2024
Today’s cyber threats landscape cannot be mitigated with technological innovations alone.
Quantum DXi9000 Series Hybrid Data Protection Appliance
Information Security

Quantum DXi9200 Hybrid Data Protection Appliance

Nov. 22, 2024
The new backup solution is designed to help customers prepare for, protect against, and quickly recover from cyberattacks.
Versa introduces Cloud Firewall on AWS Marketplace
Cloud Security Solutions

Versa introduces Cloud Firewall on AWS Marketplace

Nov. 22, 2024
Versa Cloud Firewall supports on-demand scalability and flexible pay-as-you-go pricing, offering automated security for AWS-based enterprises.
Credit: RapidEye
As fraud becomes more prevalent in people’s lives, many are becoming resigned to the inevitable fraud. As consumers’ activities and habits evolve, they are instead becoming more worried about specific types of fraud.
Information Security

Strategies for navigating the new frontiers of fraud

Nov. 20, 2024
Companies are paying close attention to the growing use of advanced technology and what it means for their businesses.
Credit: Matic Grmek
Ransomware-as-a-service — known as RaaS — operators such as LockBit rely on networks of other malicious hackers known as affiliates to carry out attacks. RaaS operators provide the malware and infrastructure to affiliates, and the two sides share the ransom paid.
Cybersecurity

How today's ransomware groups operate

Nov. 20, 2024
Vulnerability-related threat intelligence can help organizations understand which software flaws threat actors are interested in exploiting.
Credit: BlackJack3D
HiveWatch’s AI Operator is positioned as the game-changer, automating mundane tasks while empowering human professionals to focus on complex strategic initiatives.
Artificial Intelligence

HiveWatch unveils AI Operator powered by Anthropic’s Claude

Nov. 20, 2024
This AI innovation aims to transform security teams' operations, empowering them to be more proactive and intelligence-driven.