Information Security

The SecurityInfoWatch.com Information Security product category is a collection of news, product listings and other resources for security professionals researching Information Security solutions. It covers a wide variety of network security hardware and software products.
Credit: Yuri_Arcurs
When we think about cybersecurity, we often focus on blocking bad actors and avoiding attacks like phishing and ransomware. However, data is constantly shared without people's knowledge or consent, and until relatively recently, this practice was legal and there were very few barriers to doing so.
Breach Detection

Why it’s not just about hackers anymore

Dec. 10, 2024
The growing privacy crisis requires proactive auditing, reducing unnecessary tracking, limiting third-party data sharing and prioritizing consent.
Getty Images
Access & Identity

AI and Access Control, Perfect Together?

Dec. 9, 2024
Rob Rowe, the head of the HID AI Lab, shares his valuable insights and cautious perspectives as the security industry continues to harness AI's potential
Credit: imaginima
Your security network isn't your average IT setup. It needs to be purpose-built for resilience and responsiveness.
Networking Equipment and Cabling

How to Choose a Network Provider That Mirrors Your Needs

Dec. 9, 2024
Designing and implementing a physical security network takes strategic thinking and planning.
Credit:DKosig
The CRA is the first European regulation to uphold legislation horizontally across the entire market of products with digital elements (PDEs) – securing products, components, and subcomponents in the whole supply chain instead of simply the final usage stage.
Information Security

What Does CRA Compliance Look Like in the Smart Physical Security Industry?

Dec. 9, 2024
With the implementation period commenced, OEMs in the smart physical security industry must take immediate, proactive action to ensure compliance.
Former Microsoft CSO Mike Howard is a seasoned writer of industry leadership topics and spy novels. He is a regular contributor to STE.
Security Executives

It’s the Policy, Stupid

Dec. 9, 2024
We have just completed an intense and partisan election cycle. What else is new? Well, plenty. We are in unprecedented times when a former President, Donald Trump, ran again after...
Credit: BeeBright
Every company needs to follow defined planning cadences to set a rhythm for the business, such as the fiscal year, financial audits, board meetings, and other activities that may trigger related planning activities.
Security Executives

How to plan for strategic cyber risk management

Dec. 6, 2024
CISOs can optimize their cybersecurity programs and budgets by quantifying cyber risks in monetary terms and prioritizing risk mitigation based on impact and ROI.
Credit: Dragos Condrea
Salt Typhoon’s operations are characterized by sophisticated tactics aimed at persistent access to their targets. They exploit vulnerabilities in public-facing systems, including routers and firewalls, and leverage compromised credentials to escalate privileges and move laterally within networks.
Breach Detection

Chinese hackers continue to torment U.S. telecommunication companies

Dec. 4, 2024
These continued Salt Typhoon attacks threaten the nation’s critical infrastructure and national security.
Credit: JustSuper
Cloud detection and response (CDR) is a security approach specifically designed for cloud environments that focuses on threat detection, immediate incident response and service integrations.
Cloud Security Solutions

Why visibility alone isn't enough in cloud security

Dec. 4, 2024
To truly protect cloud environments, businesses must move beyond fragmented solutions.
Creative #: 2164249606
gettyimages2164249606
Cybersecurity

From cockpits to code: Aviation’s lessons for enhancing cybersecurity

Dec. 4, 2024
There is a real tailwind across the industry with security executives and technology providers leaning into a measured cybersecurity approach.
Credit: Just_Super
Cybercriminals are no longer limited to sending malicious emails and texts. They’re making direct, human-to-human contact, catching even the most cautious off-guard.
Cybersecurity

How callback phishing threatens our online safety

Dec. 2, 2024
The new face of phishing continues to shift and grow; awareness remains our best defense.
Credit: NoSystem images
As cyber threats become more targeted and sophisticated, finance departments face many new security challenges, beginning with financial processes.
Security Executives

It’s time for CFOs to saddle up to the cybersecurity table

Dec. 2, 2024
Today’s cyber threats landscape cannot be mitigated with technological innovations alone.