The SNE Series security enclosure line from Middle Atlantic Products now includes the End Cable Chase – a full-height, slim enclosure option. . .
The security operations center is the central nervous system of a security department. From that one room, enterprise security leaders can monitor worldwide risks, address ongoing incidents, track system health and sustain operations across the business.
The new Impulse Dual Sit/Stand consoles from Winsted provide two independently adjustable, ergonomically curved work surfaces for security operators.
Was your physical security system designed, by default, to be cyber secure? That is a question we all need to ask as we evaluate security for an IoT world.
Based off a recent survey, 40% of security professionals believe their systems are only somewhat secure.
Cybersecurity, particularly in the physical security space, is a hot topic. Brivo is focusing on educating security professionals on the intersection of cybersecurity and physical security.
On-premise systems are quickly becoming outdated for current physical security needs.
The European Union’s new General Data Protection Regulation (GDPR) came into effect in May of this year. While many in North America believe that since they are not located within the European Union the regulation does not apply to their operations, the territorial scope of the GDPR is well and truly global. Many of these […]
A new report shows that only 52.4 percent of organizations maintained full PCI DSS compliance in 2017, compared to 55.4 percent in 2016.
Type: Threat Analysis Category: CTU Research CTU researchers analyzed the Sakula Malware Family which enables an adversary to run interactive commands to download and execute additional components.
Type: Threat Analysis Category: CTU Research CTU researchers investigated a new file-encrypting ransomware family named TeslaCrypt, which was distributed by the popular Angler browser exploit kit.
Type: Threat Analysis Category: CTU Research Threats to banks and financial institutions continue to grow and mature as cybercriminals become far more creative and increasingly organized.
Type: Threat Analysis Category: CTU Research SecureWorks Counter Threat Unit™ researchers discovered malware that bypasses authentication on Active Directory systems.
Type: Threat Analysis Category: CTU Research Read why CTU researchers consider CryptoWall to be the largest and most destructive ransomware threat on the Internet as of this publication.
Type: Threat Analysis Category: CTU Research Take a deeper look at Lurk, a malware downloader that uses digital steganography: the art of hiding secret information within a digital format.
Type: Threat Analysis Category: CTU Research The CTU research team collaborated with the UK NCA, the U.S. FBI, and the Shadowserver Foundation to take over the Dridex Bugat v5 banking trojan.
Type: Threat Analysis Category: CTU Research While tracking a suspected Iran-based Threat Group-2889, SecureWorks CTU researchers uncovered a network of fake LinkedIn profiles.
Type: Threat Analysis Dell SecureWorks Counter Threat UnitTM (CTU) Investigated Activities Associated with Threat Group-3390 Category: CTU Research Analysis of TG-3390’s operations, targeting, and tools led CTU researchers to assess with moderate confidence the group is located in China.
Businesses Concerned About Data Security in the Cloud Should Consider These Recommendations Category: Cloud Security This paper offers 10 tips that businesses should implement in order to reduce the security risks in the cloud.