Video surveillance powered by artificial intelligence (AI) can assist companies with various technologies, like intrusion detection, suspicious behavior monitoring, object tracking and more.
Yeager Airport will use the security grant funds to install multiple new safety technologies, including West Virginia's first gunshot detection system in an airport.
Integrated intrusion alarm monitoring across more than 380 restaurants within the group allows stakeholders to cut down on false alarms and standardize security response.
Many security operations centers employ artificial intelligence and machine learning tools to detect advanced threats, however, reaching too high too quickly with technological solutions can leave security teams with unclear or inefficient workflows.
Some organizations believe that the use of public cloud services allows them to outsource all of their security needs, but often those options don't cover an organization's entire threat surface.
The Plaza Hotel & Casino in Downtown Las Vegas, Nev. will be using a multi-sensor threat detection platform, offering increased security and safety for resort guests, staff and partners.
Vectra released its 2020 Spotlight Report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks.
Vectra released its 2020 Spotlight Report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks.
The 2020 State of Security Operations study from Forrester Consulting finds that enterprise security teams around the world continue to struggle with the growing pace, volume and sophistication of cyberattacks. The commissioned survey of over 300 enterprise security operations professionals reveals that only 46% of enterprises are satisfied with their ability to detect cybersecurity threats.
Honeypots were the first form of deception technology. IT security researchers started using them in the 1990s, with the intent to deceive malicious actors who had made it onto the network into interacting with a false system. In this way, honeypots could gather and assess the behavior of the malicious actors. They were not created for threat detection. However, things have changed a great deal in the years since honeypots were created – including deception technology.