It has been nearly a year since a coalition of IT and cybersecurity providers discovered a highly sophisticated Russian-aligned hacking campaign that most notably leveraged IT management software from SolarWinds to conduct espionage on U.S. agencies, tech companies and other high-value organizations. The IT industry has learned a lot since then, including the increasing skill […]
Popular Tags within: Physical SecurityCybersecurity Collaboration Microsoft ransomware Zoom UCC phishing Zero Trust Vulnerability Management MFA
My TechDecisions Associate Editor Zachary Comeau speaks with Rick Focke, director of product management for access control at Tyco Software House, a brand of Johnson Controls, about its new iSTAR Ultra G2 Cyber-Hardened Controller. In the video above, Rick Focke dives into what makes the product secure, why security is important in access control systems, and more. […]
Within the next five years. half of all data centers will deploy advanced artificial intelligence and machine learning technologies, resulting in a significant efficiency boost, according to IT research firm Gartner. By 2025, half of cloud data centers will use advanced robots with AI and machine learning capabilities, which will increase operating efficiency by 30%, […]
The new Tyco Software House iSTAR Ultra G2 is a powerful, cyber-hardened network door controller that supports up to 32 readers. Built using a Trusted Execution Environment (TEE), iSTAR Ultra G2’s rock-solid, hardware-based cyber protection guarantees confidentiality of code and data, and includes advanced enterprise features such as OSDP encrypted, two-way reader communications and peer-to-peer clustering. […]
As law enforcement authorities are grappling with the rise of ransomware and cryptocurrency technologies, Deputy Attorney General Lisa O. Manac has formed a new National Cryptocurrency Enforcement Team (NCET). The team will tackle complex investigations and prosecutions of criminal misuses of cryptocurrency and investigate crimes committed by virtual currency exchanges, mixing and tumbling services, and […]
A faulty configuration change led Facebook, Instagram and WhatsApp to all go down for at least six hours on Monday, October 4. Those trying to reach the social media platforms were met with browsers and apps displaying DNS errors on connection attempts. The routing prefixes suddenly disappeared from the internet’s border gateway protocol (BGP), a […]
Americans may have to swap out their surveillance cameras that are NDAA-compliant pending FCC and NDAA regulation.
Both the cloud and on-premises systems have their advantages and disadvantages, but recent attacks against on-premise systems coupled with the proliferation and advancement of cloud-based IT architecture are tilting the scales in favor of the cloud. A company that owns its own on-premises servers has more control over security, but are responsible for all of […]
System operators within an electric utility control room are responsible for balancing and maintaining the grid and reliably providing critical resources to millions of people over a wide area. Failures in the electric grid, including downtime or malfunction, could mean life or death. In the mission-critical space of control rooms, systems need to be functioning […]
Japan puts on a mini-show to the world what advanced technologies are yet to come at the 2020 Olympics in Tokyo.