Information Security

The SecurityInfoWatch.com Information Security product category is a collection of news, product listings and other resources for security professionals researching Information Security solutions. It covers a wide variety of network security hardware and software products.
sos_technologies_authorization_logo
May 2, 2025
The GovRAMP authorization positions SmartSOS as a trusted solution for unifying fragmented public safety systems and accelerating emergency response times across critical infrastructure...
Credit: Jacob Wackerhausen
The Change Healthcare cyberattack made a lasting impact on the healthcare industry and security professionals worldwide. Over a year later, it is still pointed to as an example of a breach that can have devastating consequences, but the lessons security leaders can take away will help them be better prepared for the future.
April 16, 2025
Lessons for cybersecurity leaders include that security solutions and protocols must evolve as cyberattacks continue to evolve.
Credit: Thinkhubstudio
While AI has strengthened cybersecurity defenses, cybercriminals have also weaponized it to enhance the sophistication and effectiveness of ransomware attacks.
April 10, 2025
As artificial intelligence reshapes the cyber threat landscape, organizations must rethink their defense strategies to counter ransomware attacks that are faster, smarter, and...
Credit: Jason Doiy
What 23andMe underscores isn’t limited to one company or one industry. It reminds us that a business's durability is measured not just in capital but also in how responsibly it handles its data.
April 9, 2025
The 23andMe collapse reveals deep flaws in how companies treat personal data—not as a sacred trust, but as a disposable asset.
sdecoret / iStock / Getty Images Plus / Getty Images
In the interconnected world of IoT, robust cybersecurity measures are essential to protect data integrity and privacy.
April 8, 2025
The rapid adoption of IoT devices has significantly expanded the attack surface for cyber threats, necessitating robust security measures to protect data integrity, privacy and...
Credit: Olemedia
Traditional EDR is evolving, and the next phase of endpoint security is here: Preemptive Endpoint Protection (PEP). Unlike its predecessor, PEP doesn’t just detect and respond to attacks; it actively prevents them.
March 31, 2025
Why reactive cybersecurity falls short and what you can do about it.
Credit: everythingpossible
Rather than relying on a rigid set of prescriptive controls, the standard enables organizations to tailor their security measures to their specific risk environments. Key changes include expanded multi-factor authentication requirements, increased emphasis on continuous risk assessment, and better integration of security into business-as-usual activities.
March 31, 2025
PCI DSS 4.0, finalized in March 2022, goes into full effect on March 31, 2025, and introduces a more flexible, outcome-based approach to securing payment data.
Credit: Denis Novikov
Understanding why social engineering works so effectively requires insight into the psychology behind it.
March 18, 2025
Understanding how social engineering can cripple an organization is a critical driver for implementing solid policy and security frameworks.
JuSun / iStock / Getty Images Plus / Getty Images
As third-party breaches continue to rise, organizations must recognize that their security is only as strong as the weakest link in their vendor ecosystem.
March 18, 2025
The Black Kite 2024 Third-Party Breach Report reveals significant cybersecurity vulnerabilities in vendor supply chains, with 92 vendors linked to breaches affecting 227 companies...
Credit: PeopleImages
The healthcare sector faces unique cybersecurity challenges due to the sensitive nature of the data it handles and the critical services it provides. By understanding the various vulnerabilities and implementing robust security measures, healthcare organizations can better protect themselves against cyber threats.
Understanding vulnerabilities and implementing strong security measures help healthcare organizations defend against cyber threats.
Credit: designer491
Ransomware groups now specifically target healthcare providers, knowing that the immediate need to restore patient care services increases the likelihood of ransom payments.
March 13, 2025
Effective implementation hinges on transparent communication with staff, patients, and business partners about new security measures and their impact on workflow.
Credit: Oselote
Today, IoT devices, including physical security products, often operate in diverse and remote environments, with fleets typically ranging from thousands to tens of thousands of devices.
March 13, 2025
Legacy methods of updating physical security devices, like manual intervention or USB-based updates, are outdated and impractical in today’s interconnected landscape.
Credit: Tero Vesalainen
gettyimages1065782564
March 13, 2025
As healthcare policy takes center stage, recently enacted cybersecurity legislation is poised to redefine patient privacy and data security. At the forefront of these changes ...
360_privacy_dashboard
March 11, 2025
ISC West 2025 Booth 33045: Tool removes Personally Identifiable Information (PII) from the open web and data broker websites.
desi_chip_photo
ISC West 2025 Booth 32069: Upgrade new or existing readers and sensors into Zero Trust devices with PKI-secured encryption.
swear_validation_tool
March 10, 2025
ISC West 2025 Booth 31086