Information Security

The SecurityInfoWatch.com Information Security product category is a collection of news, product listings and other resources for security professionals researching Information Security solutions. It covers a wide variety of network security hardware and software products.
Credit: Vertigo3d
Given the complexity and distributed nature of file data, it’s no surprise that it represents one of the largest surfaces for potential ransomware damage.
May 13, 2025
Cut expenses, slash risks and prep for AI: How file-level tiering tackles the unstructured data crisis.
sos_technologies_authorization_logo
May 2, 2025
The GovRAMP authorization positions SmartSOS as a trusted solution for unifying fragmented public safety systems and accelerating emergency response times across critical infrastructure...
Credit: Vertigo3d
The explosion of digital data has transformed the way businesses operate. Technologies like AI-driven automation, IoT, and cloud computing have generated vast amounts of data, making data protection more complex than ever.
April 30, 2025
Organizations embracing modern backup solutions will protect themselves from financial losses and downtime while building resilience.
Credit: Douglas Rissing
In February, the current administration cut 130 positions at the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to reduce government spending.
April 29, 2025
Strategies for navigating the evolving digital landscape despite cutbacks and new mandates.
AI-Generated/EBM Security Group
grid_attack_in_spain
April 29, 2025
A rare power outage across the Iberian Peninsula sparked immediate speculation of a cyberattack, highlighting how deeply fears of digital sabotage now shape public and governmental...
Credit: BlackJack3D
The cybersecurity ecosystem circulates enough fear, uncertainty, and doubt that it can feel like there’s no light at the end of the tunnel.
April 23, 2025
The double-edged sword that could save—or sabotage—enterprise security
Verizon Data Breach Investigations Report (DBIR)
Exploitation of known vulnerabilities is on the rise, with the 2025 Verizon DBIR revealing a 34% increase in this tactic as an initial breach vector — now responsible for one in five data breaches.
April 23, 2025
The latest Data Breach Investigations Report from Verizon highlights a 34% increase in the use of vulnerability exploitation as a breach entry point, underscoring the urgent need...
Kiteworks and Wasabi partner to deliver integrated cloud storage and secure file transfer
April 23, 2025
The integration with Wasabi hot cloud storage delivers cost-effective cloud storage with enterprise-grade security and compliance.
Johan Paulsson, CTO, Axis Communications
April 21, 2025
The 2025 BIG Innovation Awards honor organizations and individuals pushing boundaries and advancing their industries.
Credit: Jacob Wackerhausen
The Change Healthcare cyberattack made a lasting impact on the healthcare industry and security professionals worldwide. Over a year later, it is still pointed to as an example of a breach that can have devastating consequences, but the lessons security leaders can take away will help them be better prepared for the future.
April 16, 2025
Lessons for cybersecurity leaders include that security solutions and protocols must evolve as cyberattacks continue to evolve.
Credit: Thinkhubstudio
While AI has strengthened cybersecurity defenses, cybercriminals have also weaponized it to enhance the sophistication and effectiveness of ransomware attacks.
April 10, 2025
As artificial intelligence reshapes the cyber threat landscape, organizations must rethink their defense strategies to counter ransomware attacks that are faster, smarter, and...
Credit: Jason Doiy
What 23andMe underscores isn’t limited to one company or one industry. It reminds us that a business's durability is measured not just in capital but also in how responsibly it handles its data.
April 9, 2025
The 23andMe collapse reveals deep flaws in how companies treat personal data—not as a sacred trust, but as a disposable asset.
sdecoret / iStock / Getty Images Plus / Getty Images
In the interconnected world of IoT, robust cybersecurity measures are essential to protect data integrity and privacy.
April 8, 2025
The rapid adoption of IoT devices has significantly expanded the attack surface for cyber threats, necessitating robust security measures to protect data integrity, privacy and...
Credit: Olemedia
Traditional EDR is evolving, and the next phase of endpoint security is here: Preemptive Endpoint Protection (PEP). Unlike its predecessor, PEP doesn’t just detect and respond to attacks; it actively prevents them.
March 31, 2025
Why reactive cybersecurity falls short and what you can do about it.
Credit: everythingpossible
Rather than relying on a rigid set of prescriptive controls, the standard enables organizations to tailor their security measures to their specific risk environments. Key changes include expanded multi-factor authentication requirements, increased emphasis on continuous risk assessment, and better integration of security into business-as-usual activities.
March 31, 2025
PCI DSS 4.0, finalized in March 2022, goes into full effect on March 31, 2025, and introduces a more flexible, outcome-based approach to securing payment data.