Cybersecurity

The SecurityInfoWatch.com Cybersecurity category is a collection of news, analysis, and other information relevant to security professionals with corporate data protection responsibilities as well as systems integrators and installers tasked with securing physical security and Internet of Things devices on the network.
NicoElNino / iStock / Getty Images Plus via Getty Images
AI agents are increasingly integrated into enterprise systems, performing tasks autonomously across networks — often without sufficient oversight.
June 25, 2025
A new report from BeyondID warns that autonomous AI agents are becoming powerful, unmonitored insiders within enterprise networks — and most organizations aren’t prepared to secure...
KnowBe4 collaborates with Microsoft to strengthen email security
June 25, 2025
The integration allows organizations to maintain their existing Microsoft security investments while adding an additional layer of specialized threat detection and response.
Healthcare Facilities Face a New Threat: AI Agents
June 25, 2025
AI can unlock new efficiencies in healthcare, but each implementation also opens up new attack surfaces for bad actors to target.
Barracuda launches Managed Vulnerability Security
June 25, 2025
Managed Vulnerability Security provides expert-led vulnerability scanning, analysis, and contextual reporting across organizations' networks and cloud infrastructure.
Tara Ryan, Chief Marketing Officer, Tanium
June 25, 2025
In her role with Tanium, Tara will oversee the company’s brand, corporate marketing, global communications, and demand generation initiatives.
Credit: Shutter2U
A recent Gartner report projects the Digital Twin market to grow from $35 billion in 2024 to $379 billion in 2034, representing a 900% increase over the coming decade.
June 24, 2025
Zero Trust unlocks the data integrity and confidence that delivers the promise of AI to electronic and physical security systems.
Credit: MTStock Studio
Phishing is one of the most common and easily executed cyberattacks. Almost everyone with an email address or a mobile device has encountered a phishing scam before.
June 24, 2025
Social engineering remains one of the easiest ways for cybercriminals to penetrate enterprise defenses; however, trained employees can disrupt the modern kill chain before it ...
Credit: Wirestock
gettyimages1442107515
June 24, 2025
I remember conversations with loss prevention directors in the 1980s and throughout the 90s where stories were shared of bizarre methods for stealing merchandise, gaming POS systems...
Credit: sasha85ru
Physical security professionals need not be Zero Trust experts but should advocate for it, defining their systems’ overall network design and usage.
Intelligent physical security system devices—especially AI-enabled video cameras—have become high-value targets for hackers, who now deploy malware explicitly designed...
Credit: pchoui
gettyimages658631542
June 24, 2025
This week has seen my social media interactions explode with all the postings and podcasts from the 2025 RSA Conference, held annually in San Francisco. It is also the fifth anniversary...
thumbnail_lifecyclestates
June 24, 2025
BackBox 8.0 introduces a new platform home page, offering a holistic view of network cyber resilience across three key pillars.
stackArmor collaborates with Google Public Sector and Carahsoft to boost FedRAMP compliance
June 24, 2025
This initiative enables Broadcom's Rally and Clarity platforms to achieve FedRAMP compliance through stackArmor's Armory ATO Acceleration solution.
Thales announces new suite of detection and response capabilities for Imperva
Detection and response to deprecated APIs, unauthenticated APIs, and BOLA attacks are now available as part of Imperva Application Security.
Kiteworks expands email security capabilities with Zivver acquisition
June 23, 2025
This strategic acquisition enhances Kiteworks’ capabilities in secure communication while further expanding its European presence.
KnowBe4 research uncovers disconnect between workplace AI adoption and policy awareness
June 23, 2025
Findings suggest that the vast majority of AI activity within organizations is taking place without guidance or oversight.