Skip to Content

Cybersecurity


Tech_Trafficking_TN

Cybersecurity

Technology and Trafficking: The tick-tocking time bomb

September 15, 2020Elisa Mula and Min Kyriannis

Human trafficking is a topic that needs to be addressed, especially by having conversations about it with loved ones. Unfortunately, many keep quiet or do not realize how close these criminals are to people — they can be your neighbors, friends or even people you work with. The recent arrest of Ghislaine Maxwell shows just how easily it is for predators to manipulate and prey upon people. Min Kyriannis, cybersecurity expert: Years ago, children were often taught never to talk to strangers;...

Cybersecurity, Min Kyriannis, Stop Child Trafficking Now


Read Full Articlered right arrow icon

Antoinette King

Cybersecurity

Network-centric U.S. military systems and the rise of CMMC

August 28, 2020Antoinette King

The digital revolution has enhanced military capabilities in so many positive ways. In the U.S., this is referred to as a Revolution in Military Affairs (RMA) (Stiennon, 2015). Reconnaissance through unmanned aerial and marine vessels; the use of GPS to refine target coordinates; and digital communications are just some examples of systems that have been enhanced to provide the military with enhanced capabilities resulting in a reduction of casualties and improved efficiency. However, with this...

AI, artificial intelligence, Cybersecurity, encryption, Internet of things, IoT, NIST


Read Full Articlered right arrow icon

Specifically Speaking with Min Kyriannis

Cybersecurity

Specifically Speaking with Min Kyriannis

June 3, 2020Ginger Hill, Managing Editor

NEW YORK—Security Systems News caught up with cybersecurity expert Min Kyriannis to talk about her more than 20 years experience, creating a cybersecurity program for building operational systems and the blending of cyber-physical security. What kinds of systems do you design/specify and what services does the company provide? Jaros, Baum & Bolles is an MEP engineering firm that has been around for over a century. It has numerous core services, one of which is low-voltage. When I was...

Baum & Bolles (JB&B), cyberssecurity, Jaros, Min Kyriannis, Specifically Speaking


Read Full Articlered right arrow icon

Cybersecurity

Cybercriminals target remote workers during pandemic

April 1, 2020Ginger Hill, Managing Editor

YARMOUTH, Maine—As the COVID-19 pandemic rages on, the current cybercrime landscape is focused on businesses of all sizes as more and more employees are working from home per government protocols to contain, control and remedy the virus. Cybercriminals are actively phishing, and vishing and smishing, too, and the hyper risk presented right now to small businesses — such as some security manufacturers, integrators and consultants — as they are the entities that cannot afford to purchase...

COVID-19, Cyber Risk, Cybercrime, Cybersecurity, Scott Watnik, small businesses


Read Full Articlered right arrow icon

Cybersecurity

Defendify raises $2M in seed money

January 29, 2020Paul Ragusa, Editor

PORTLAND, Maine—Defendify, an all-in-one SaaS cybersecurity platform developer, announced it closed on $2 million in seed funding, bringing the total raised in the last 18 months to $3.6 million. In that time, Defendify has added thousands of users, doubled its employee count and moved into a larger office space to accommodate the growth.“We are at about 23 employees now and we hiring a bunch more, so we expect to be at close to 40 by year's end,” Defendify Co-Founder Rob Simopoulos...

Cybersecurity, Defendify, Rob Simopoulos


Read Full Articlered right arrow icon

Cybersecurity

Putting the SHIELD Act and CCPA into perspective

January 29, 2020Ginger Hill, Managing Editor

YARMOUTH, Maine—On Jan. 1, two new statutes — the Stop Hacks and Improve Electronic Data Security Act (the SHIELD Act), a consumer privacy statute, and the California Consumer Privacy Act (CCPA), a cyber-breach notification statute — went into effect, changing the way some security professionals do business.“While the CCPA is regarded as the most comprehensive consumer privacy statute passed in the nation to date, the SHIELD Act is generally regarded as the nation's strictest...

California Consumer Privacy Act, CCPA, Cybersecurity, Data privacy, privacy, Scott Talbott, Scott Watnik, SHIELD Act


Read Full Articlered right arrow icon

Cybersecurity

How companies can fight against cyber threats

December 16, 2019Ginger Hill, Managing Editor

YARMOUTH, Maine—As 2019 closes, 2020 is full of new possibilities and opportunities. While it's a time for growth, change and newness, cyber criminals are lurking in the background ready to strike. The threats that these criminals have planned for the new year have already been months in the making and are far from cookie cutter. Therefore, companies must be alert and ready.“Defending a company against them [cyber threats and crimes] requires a broad approach,” Christian Nascimento,...

Christian Nascimento, Comcast, cyber security, Cybersecurity, HID Global, Min Kyriannis, phishing, Security Industry Association, SIA, SIA Cybersecurity Advisory Board


Read Full Articlered right arrow icon

Cybersecurity

100 Women in 100 Days Cybersecurity Career Accelerator announces next class

November 21, 2019SSN Staff

SACRAMENTO, Calif.—The free cybersecurity training and accreditation program, 100 Women in 100 Days (100w100d), founded and managed by Sacramento-based cyber risk consulting firm, Inteligenca, will help another 100 students reboot their careers at Japan's Saya University.“The opportunity with Saya shows that people around the world recognize the need to get more women into the cybersecurity field,” Inteligenca CEO Carmen Marsh said in the announcement. “We are witnessing a...

100 women in 100 days, cyber security, Cybercrime, Cybersecurity, Inteligenca, NIST


Read Full Articlered right arrow icon

Cybersecurity

Cybersecurity pledge signed by over 20 countries

September 27, 2019Ginger Hill, Managing Editor

YARMOUTH, Maine—As ink was flying and signatures made on Monday, September 23, on the Joint Statement on Advancing Responsible State Behavior in Cyberspace, representing the 27 countries committed to upholding this international rules-based order, an evolving framework that guides responsible state behavior in cyberspace, memories resurfaced of my dad and grandmother, both of whom never got to see, much less interact with, the Web. My dad was a “hunt-and-peck” type of man, and as...

cyber incidents, Cyber Risk, Cybercrime, Cybersecurity, Joint Statement on Advancing Responsible State Behavior in Cyberspace


Read Full Articlered right arrow icon

Cybersecurity

Cyber:Secured Forum 2019 rehash

September 4, 2019Ginger Hill, Managing Editor

DALLAS—About a month ago, Cyber:Secured Forum made its way to the Lone Star state and now with the pumpkin spice latte (PSL) trend well on its way in early September, it's time to grab one and reflect on cyber and physical security. The following are some key points and trends gleaned from the forum by various industry professionals that will help open and navigate discussions into the cyber and physical security worlds.Discussion topic #1: IoT, convergence and supply chain riskAs supply risk...

Cloud, cloud adoption, Cyber:Secured Forum, Cybersecurity, NIST, physical security


Read Full Articlered right arrow icon