Blog
Cybersecurity Alert: Increase in Phishing Scams
August 26, 2025
0 Comment
By Kriti Venkat
The Department of Information Technology warns the Seton Hall community of a surge in phishing scams designed to steal personal and financial information. These attacks often occur during busy academic periods, such as the start of a semester or around financial aid deadlines, when students, faculty, and staff are managing multiple priorities.
6 Ways to End Reactive Cybersecurity
August 25, 2025
0 Comment
by Emanuel Salmona
Over 600 million cyberattacks happen every day, and most teams don’t uncover them until the damage is already done. Security teams aren’t standing still. Investments have grown, workflows have matured and automation is everywhere. But despite the progress, most programs still struggle to answer a basic question: are we reducing the
How Integrating Cybersecurity & Physical Security Is The Future Of Access Control Systems
August 22, 2025
0 Comment
by Sweta Bose
Access control used to mean who could simply enter commercial properties via badges, keys or PIN codes, but that’s all changing today in 2025 as the core concept of access control is being broadly expanded. As countless organizations embrace the latest digital transformations, the lines between cybersecurity and physical security
Rethinking Network And Security For A Digital-First Future
August 21, 2025
0 Comment
By David Joosten
Today, digital transformation is more than a competitive advantage—it’s a business imperative. As the world becomes ever more interconnected, an organization’s footprint extends beyond its office walls to traditional and digital touchpoints globally. While companies worldwide compete to modernize their infrastructure, they are also faced with challenges in agility, security
The cloud’s greatest vulnerability is hiding in plain sight
August 20, 2025
0 Comment
by Douglas Merritt
A crisis is unfolding across enterprise cloud environments—one that’s easily overlooked but becoming impossible to ignore. As organizations rush to embrace AI and next-generation digital infrastructure, a dangerous blind spot has emerged: the unseen, unprotected, and autonomous communication between cloud workloads. In this new era of agentic and generative AI, where autonomous