Skip to Content

Tag: Cybersecurity


Also Noted

SecurXperts approved as vendor for DoD Cybersecurity Maturity Model (CMMC) marketplace

October 21, 2020SSN Staff

BALTIMORE, Md.—The Cybersecurity Maturity Model Certification Accreditation Body (CMMC-AB), named SecurXperts as an approved vendor to participate in the certification, accreditation and licensing process for the companies that will play critical roles in the CMMC ecosystem. Early this year, the U.S Department of Defense (DoD) released the first iteration of the Cybersecurity Maturity Model Certification (CMMC) framework, which requires DoD contractors and subcontractors to obtain third-party...

Cybersecurity, Darnell Washington


Read Full Articlered right arrow icon

CyberThumb

General News

News Poll: Readers weigh in on web security, safety for children

October 21, 2020Paul Ragusa, Editor

YARMOUTH, Maine—The article “Technology and Trafficking: the tick-tocking time bomb” by Elisa Mula, founder, EMD Designs Inc., and Min Kyriannis, managing director of EMD/JMK and co-president of the Women in International Security (WIIS) New York, opened our eyes to a real reality that is potentially affecting the safety and security of our children. In this month’s New Poll, we asked readers for their thoughts on this important but seldom looked at topic that revolves...

Cybersecurity, SSN News Poll


Read Full Articlered right arrow icon

Also Noted

Hanwha receives UL Cybersecurity certification for Wisenet 7 cameras

September 25, 2020SSN Staff

TEANECK, N.J.—Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announced that it has received the UL CAP (Cybersecurity Assurance Program) certification for its recently-launched range of IP cameras featuring Wisenet 7 SoC (System on Chip). The UL Cybersecurity Assurance Program (UL CAP) aims to minimize risks by creating standardized, testable criteria for assessing software vulnerabilities and weaknesses in embedded products and systems. This helps...

Cybersecurity, Hanwha Techwin, UL


Read Full Articlered right arrow icon

Also Noted

Cybersecurity accrediting body approves first 11 LPPs

September 23, 2020SSN Staff

BALTIMORE, Md.—The Cybersecurity Maturity Model Certification Accreditation Body (CMMC-AB), which serves as the authorized training, credentialing and accreditation ecosystem for CMMC, has just named the first 11 Licensed Partner Publishers (LPPs) to join the CMMC-AB ecosystem. “This is just the first wave of organizations that will support the certification process with training curricula. This is exciting for us because we now have partners that are in this with us together and can...

Cybersecurity


Read Full Articlered right arrow icon

John Acosta, The Clarient Group

General News

Specifically Speaking with John Acosta

September 16, 2020Paul Ragusa, Editor

What is your role at the company? I am the Lead Security Consultant for The Clarient Group (TCG). I design and specify all the security systems required in a project, and work with my teammates to integrate the security systems with other building systems, to the greatest extent possible. What kinds of systems do you design/specify and what services does the company provide? I have been very fortunate to be in positions to design the full gamut of security systems both physical and...

biometrics, Cybersecurity, facial recognition, physical security, Security Consultants, Specifically Speaking


Read Full Articlered right arrow icon

Tech_Trafficking_TN

Cybersecurity

Technology and Trafficking: The tick-tocking time bomb

September 15, 2020Elisa Mula and Min Kyriannis

Human trafficking is a topic that needs to be addressed, especially by having conversations about it with loved ones. Unfortunately, many keep quiet or do not realize how close these criminals are to people — they can be your neighbors, friends or even people you work with. The recent arrest of Ghislaine Maxwell shows just how easily it is for predators to manipulate and prey upon people. Min Kyriannis, cybersecurity expert: Years ago, children were often taught never to talk to strangers;...

Cybersecurity, Min Kyriannis, Stop Child Trafficking Now


Read Full Articlered right arrow icon

Also Noted

Johnson Controls introduces Tyco Software House iSTAR Edge G2

September 14, 2020SSN Staff

CORK, Ireland—The iSTAR Edge G2 provides powerful, flexible and secure access control operation at the network edge enabling cyber-hardened, standalone physical access control. iSTAR Edge G2 provides: An optional PoE module that provides ample power for two doors, while allowing the controller to leverage existing network infrastructure to reduce installation costs;  Local alarm and event buffering in the event communication to the host is interrupted; Users an advanced access...

Access Control Technologies, Cybersecurity, Johnson Controls


Read Full Articlered right arrow icon

Monitoring Matters

VPN usage surges; helps boost cybersecurity

September 9, 2020Ginger Hill, Managing Editor

If you’ve been reading any of my blogs as of late, you’ll know that cybersecurity has been my main focus and for good reason. With more and more of us working from home — approximately 4.7 million in the U.S. — cybercriminals are cleaning up, wreaking havoc on individual’s lives and businesses alike. In fact, IBM’s “Cost of a Data Breach Report” pegs the average cost of a security breach at $3.92 million. However, people across the world are fighting...

Atlas VPN, Cybersecurity


Read Full Articlered right arrow icon

Antoinette King

Cybersecurity

Network-centric U.S. military systems and the rise of CMMC

August 28, 2020Antoinette King

The digital revolution has enhanced military capabilities in so many positive ways. In the U.S., this is referred to as a Revolution in Military Affairs (RMA) (Stiennon, 2015). Reconnaissance through unmanned aerial and marine vessels; the use of GPS to refine target coordinates; and digital communications are just some examples of systems that have been enhanced to provide the military with enhanced capabilities resulting in a reduction of casualties and improved efficiency. However, with this...

AI, artificial intelligence, Cybersecurity, encryption, Internet of things, IoT, NIST


Read Full Articlered right arrow icon

Monitoring Matters

Cyberattacks skyrocket, part two

August 26, 2020Ginger Hill, Managing Editor

Jumping into the nitty-gritty of the six most popular cyberattacks used against U.S. companies, in which cyberattacks shot up 93 percent over the past 12 months, I engaged the help of cybersecurity expert, Rodney Thayer, convergence engineer at Smithee Solutions LLC. Let’s explore what each of the six attacks are and what you can do to help prevent them. But, first, a little about Thayer … “I was a software developer building communications protocols; therefore, I was doing...

Cybersecurity, Rodney Thayer


Read Full Articlered right arrow icon