Cybersecurity

The SecurityInfoWatch.com Cybersecurity category is a collection of news, analysis, and other information relevant to security professionals with corporate data protection responsibilities as well as systems integrators and installers tasked with securing physical security and Internet of Things devices on the network.
Credit: akinbostanci
In physical access control, “cloud-native” platforms are engineered from the ground up for cloud microservices, elastic scaling, and continuous delivery, whereas “cloud-hosted” offerings park legacy, on-premises software on a remote server without redesigning the core architecture.
July 21, 2025
Why cloud-native access control is reshaping enterprise security for a hybrid, hyperconnected world.
Credit: adventtr
Cloud-native platforms utilize APIs, containers, and microservices to maintain agility and resilience. They are engineered for optimal uptime, automated updates, and seamless integration from the outset.
July 21, 2025
Why cloud-native access control is reshaping physical security in a post-pandemic, digital-first world — and why legacy systems can’t keep up.
Confidential Computing: The Next Evolution in Zero Trust
July 18, 2025
Data is never more vulnerable than when it’s in use. That’s exactly where confidential computing steps in to strengthen defenses and change the game.
The Cat-and-Mouse Cyber War—and How to Win It
July 18, 2025
Attackers are increasingly targeting APIs while exploiting vulnerabilities and weak security measures, so what should organizations focus on, and what steps can they take to strengthen...
Sven Loeffler / iStock / Getty Images Plus via Getty Images
The alleged breach by Salt Typhoon highlights how sophisticated cyber actors are increasingly targeting the intersection of military and state-level networks to quietly gain strategic footholds.
July 16, 2025
A newly disclosed DHS memo outlines how a months-long breach by suspected Chinese hackers could jeopardize cybersecurity coordination between National Guard units and state agencies...
Credit: imaginima
Synthetic identity fraud occurs when fraudsters create fictitious identities that can bypass traditional verification systems, such as knowledge-based authentication questions or passwords, by combining real and fabricated personal information.
July 16, 2025
AI-generated receipts and synthetic identity fraud can help businesses stay ahead of a growing threat.
Canon USA announces launch of Managed IT Services with Supra ITS
July 15, 2025
Building on a successful rollout in Canada and a strong existing partnership, this expansion brings enterprise-grade IT and cybersecurity services to U.S. organizations.
AppOmni reports major SaaS security preparedness gaps amidst surge in breaches
July 15, 2025
The majority of organizations demand better oversight of AI-enabled applications.
Credit: SC STUDIO
In today’s risk environment, the next data leak may not originate from a foreign threat actor or a disgruntled insider—it may come from a recruiter pasting candidate information into a chatbot, a software engineer uploading source code to debug an issue or an HR director drafting a sensitive memo in a consumer-facing AI tool.
July 15, 2025
Generative AI is driving productivity—and quietly introducing a new class of insider risk.
Expel research finds “strategy gap” in enterprise cyber hiring—not a talent shortage
July 15, 2025
Companies are severely misaligned on AI priorities, market conditions, and candidate expectations.
Okta and Palo Alto Networks announce AI identity security partnership
July 15, 2025
The native integration between Okta Workforce Identity and Palo Alto Networks Prisma Access Browser creates a new conditional access method to restrict access to SSO apps.
Passwords on Post-Its: 2025 Cybersecurity Pulse Survey uncovers alarming employee behaviors
July 11, 2025
Risky employee habits are leaving organizations vulnerable to increasingly sophisticated cyberattacks.
VikingCloud: Cyberattacks hit 82% of North American hotels last summer
July 11, 2025
VikingCloud research finds 82% of North American hotels were hit with a cyberattack last summer.
Credit: ATHVisions
Enterprises are walking an increasingly narrow tightrope between AI innovation and security. This metaphor aptly captures the central challenge: how to maintain robust security controls without stifling AI's competitive advantages.
July 10, 2025
As enterprise AI adoption skyrockets, organizations must urgently address escalating data security risks, balancing innovation, privacy, and third-party vulnerabilities in an ...
RH-ISAC's 2025 CISO Benchmark Report spotlights top threats facing retail and hospitality
Smaller organizations are closing the gap when comparing cyber maturity with larger companies, and cybersecurity budgets are showing consistent increases year-over-year.