Information Security

The SecurityInfoWatch.com Information Security product category is a collection of news, product listings and other resources for security professionals researching Information Security solutions. It covers a wide variety of network security hardware and software products.
Credit: Thinkhubstudio
While AI has strengthened cybersecurity defenses, cybercriminals have also weaponized it to enhance the sophistication and effectiveness of ransomware attacks.
April 10, 2025
As artificial intelligence reshapes the cyber threat landscape, organizations must rethink their defense strategies to counter ransomware attacks that are faster, smarter, and...
Credit: designer491
Ransomware groups now specifically target healthcare providers, knowing that the immediate need to restore patient care services increases the likelihood of ransom payments.
March 13, 2025
Effective implementation hinges on transparent communication with staff, patients, and business partners about new security measures and their impact on workflow.
Credit: Oselote
Today, IoT devices, including physical security products, often operate in diverse and remote environments, with fleets typically ranging from thousands to tens of thousands of devices.
March 13, 2025
Legacy methods of updating physical security devices, like manual intervention or USB-based updates, are outdated and impractical in today’s interconnected landscape.
Credit: Tero Vesalainen
gettyimages1065782564
March 13, 2025
As healthcare policy takes center stage, recently enacted cybersecurity legislation is poised to redefine patient privacy and data security. At the forefront of these changes ...
360_privacy_dashboard
March 11, 2025
ISC West 2025 Booth 33045: Tool removes Personally Identifiable Information (PII) from the open web and data broker websites.
desi_chip_photo
ISC West 2025 Booth 32069: Upgrade new or existing readers and sensors into Zero Trust devices with PKI-secured encryption.
swear_validation_tool
March 10, 2025
ISC West 2025 Booth 31086
photo / iStock / Getty Images Plus / Getty Images
If properly implemented with AI, DevSecOps provides a more efficient software development workflow by automating some of the steps and security gates.
March 4, 2025
Organizations must be prepared to fight AI cyberattacks with AI-powered DevSecOps.
March 3, 2025
Now is the time for organizations to evaluate their authentication strategies proactively.
Alexander Sikov / iStock / Getty Images Plus via Getty Images
In 2024, the healthcare sector experienced an unprecedented increase in ransomware attacks, affecting over 198 million Americans. Among these incidents, the Change Healthcare breach stood out as one of the largest in history, impacting more than 100 million individuals. Source: SonicWall
Feb. 25, 2025
The 2025 SonicWall Cyber Threat Report reveals that cybercriminals are exploiting vulnerabilities faster than organizations can patch them, putting SMBs and healthcare providers...
Credit: Vladimir Vladimirov
As businesses and governments pour resources into developing proprietary quantum algorithms, they will become invaluable, shrouded in secrecy, and fiercely guarded.
Feb. 24, 2025
As quantum computing reshapes the corporate battlefield, espionage is evolving beyond hackers and spies—organizations must master quantum security or risk losing their competitive...
Credit: stuartmiles99
Getting control over identity management requires a comprehensive and ongoing process from risk assessment through daily management.
Feb. 24, 2025
Amid a rising tide of data breaches, organizations are struggling to control identity management options.
Credit: BeeBright
DORA also affects regions outside of the EU. Although the Digital Operational Resilience Act (DORA) is an EU regulation, it is also applicable in the U.S. market. It enforces third-party risk management by holding financial institutions accountable for their vendors' operational resilience.
Feb. 19, 2025
U.S. organizations are looking to embrace similar regulatory guidelines across myriad sectors.
Credit: danijelala
By gaining access to an employee’s credentials, a bad actor also gains access to their account privileges, especially if the same credentials are used across multiple accounts.
Jan. 29, 2025
If credentials are compromised, spotting the breach quickly, the damage can be contained.
Credit: Just Super
A platform-agnostic Managed Detection and Response (MDR) solution refers to a service provider that offers MDR services independently of any specific cybersecurity platform or technology stack, becoming a “platform” in and of itself, along with advisory services that help select the best-of-breed tooling.
Jan. 29, 2025
Whether opting for an integrated platform or a mix of specialized tools, the key is establishing a robust cybersecurity strategy.
Sectigo acquires Entrust public certificate business
Jan. 29, 2025
The acquisition unlocks new growth opportunities for Sectigo to provide enhanced CLM capabilities to a broader customer base.