Information Security

The SecurityInfoWatch.com Information Security product category is a collection of news, product listings and other resources for security professionals researching Information Security solutions. It covers a wide variety of network security hardware and software products.
Credit: Yuri_Arcurs
When we think about cybersecurity, we often focus on blocking bad actors and avoiding attacks like phishing and ransomware. However, data is constantly shared without people's knowledge or consent, and until relatively recently, this practice was legal and there were very few barriers to doing so.
Breach Detection

Why it’s not just about hackers anymore

Dec. 10, 2024
The growing privacy crisis requires proactive auditing, reducing unnecessary tracking, limiting third-party data sharing and prioritizing consent.
Creative #: 2164249606
gettyimages2164249606
Cybersecurity

From cockpits to code: Aviation’s lessons for enhancing cybersecurity

Dec. 4, 2024
There is a real tailwind across the industry with security executives and technology providers leaning into a measured cybersecurity approach.
Credit: Just_Super
Cybercriminals are no longer limited to sending malicious emails and texts. They’re making direct, human-to-human contact, catching even the most cautious off-guard.
Cybersecurity

How callback phishing threatens our online safety

Dec. 2, 2024
The new face of phishing continues to shift and grow; awareness remains our best defense.
Credit: NoSystem images
As cyber threats become more targeted and sophisticated, finance departments face many new security challenges, beginning with financial processes.
Security Executives

It’s time for CFOs to saddle up to the cybersecurity table

Dec. 2, 2024
Today’s cyber threats landscape cannot be mitigated with technological innovations alone.
Quantum DXi9000 Series Hybrid Data Protection Appliance
Information Security

Quantum DXi9000 Series Hybrid Data Protection Appliance

Nov. 22, 2024
The new backup solution is designed to help customers prepare for, protect against, and quickly recover from cyberattacks.
Versa introduces Cloud Firewall on AWS Marketplace
Cloud Security Solutions

Versa introduces Cloud Firewall on AWS Marketplace

Nov. 22, 2024
Versa Cloud Firewall supports on-demand scalability and flexible pay-as-you-go pricing, offering automated security for AWS-based enterprises.
Credit: RapidEye
As fraud becomes more prevalent in people’s lives, many are becoming resigned to the inevitable fraud. As consumers’ activities and habits evolve, they are instead becoming more worried about specific types of fraud.
Information Security

Strategies for navigating the new frontiers of fraud

Nov. 20, 2024
Companies are paying close attention to the growing use of advanced technology and what it means for their businesses.
Credit: Matic Grmek
Ransomware-as-a-service — known as RaaS — operators such as LockBit rely on networks of other malicious hackers known as affiliates to carry out attacks. RaaS operators provide the malware and infrastructure to affiliates, and the two sides share the ransom paid.
Cybersecurity

How today's ransomware groups operate

Nov. 20, 2024
Vulnerability-related threat intelligence can help organizations understand which software flaws threat actors are interested in exploiting.
Credit: BlackJack3D
HiveWatch’s AI Operator is positioned as the game-changer, automating mundane tasks while empowering human professionals to focus on complex strategic initiatives.
Artificial Intelligence

HiveWatch unveils AI Operator powered by Anthropic’s Claude

Nov. 20, 2024
This AI innovation aims to transform security teams' operations, empowering them to be more proactive and intelligence-driven.
catonetworks
Encryption Solutions

Cato Networks unveils Safe TLS Inspection for encrypted traffic monitoring

Nov. 19, 2024
Cato Safe TLS Inspection allows IT teams to better secure cloud applications, deliver compliance-driven data protection, and enhance security for remote and hybrid workforces....
Credit: Vertigo3d
The need for this proactive approach stems from the inherent limitations of reactive security models. Traditional security focuses on responding to attacks after they occur, often resulting in significant damage and disruption.
Cybersecurity

How to use preemptive cybersecurity to defend against emerging financial services threats

Nov. 18, 2024
Financial services businesses cannot afford to let unauthorized software, vulnerable endpoints, mergers and acquisitions, and unmonitored security controls put them at risk.
Credit: Robert Way
Threat actors can exploit the default permission settings for Copilot in multiple ways, both directly and indirectly.
Cybersecurity

Is Microsoft Copilot a productivity booster or a cybersecurity risk?

Nov. 18, 2024
If left unaddressed, M365's default permissions and Copilot's discoverability can create major cybersecurity risks for organizations and their data.