More than 59,000 data breaches have been reported across Europe since the General Data Protection Regulation (GDPR) came into full effect, according to law firm DLA Piper.
- By Jessica Davis
- Feb 12, 2019
An investigation by Motherboard has found that an estimated 250 bounty hunters and related businesses had access to customer location data from AT&T, T-Mobile and Sprint.
- By Jessica Davis
- Feb 12, 2019
Email fraud has seen a 476 percent increase between Q4 2018 and Q4 2017, according to the Proofpoint Q4 2018 Threat Report.
- By Jessica Davis
- Feb 12, 2019
"Individuals who post the locations of DWI checkpoints may be engaging in criminal conduct since such actions could be intentional attempts to prevent and/or impair the administration of the DWI laws and other relevant criminal and traffic laws,” wrote NYPD acting Deputy Commissioner Ann Prunty in a Feb. 2 letter to Google.
- By Jessica Davis
- Feb 11, 2019
TSA agents found 4,239 total firearms in carry-ons in 2018, an average of 81.6 firearms per week, or 11.6 per day. Of the firearms found, 3,656 (86.15 percent) were loaded—another record—and 1,432 (33.74 percent) of the total had a round chambered.
- By Jessica Davis
- Feb 11, 2019
Apple is telling app developers to either remove or properly disclose to users their use of code that allows them to record the way a user interacts with their iPhone apps—or face removal from the app store.
- By Jessica Davis
- Feb 11, 2019
The Villages investigated its options for a higher-quality system in an effort to rectify what was an unnecessarily complex situation and improve the quality and management of the video surveillance systems. After evaluating solutions from a number of manufacturers, Ritch and his team chose cameras from Hanwha Techwin America for deployment throughout the property.
Google clarified in the email that per its numbers, there has not been a breach of the Nest user base. The company wanted to remind users that breaches are possible and that there are “a few easy things you can do to get the most out of Nest’s security features.”
- By Jessica Davis
- Feb 08, 2019
A leaked MGM Grand memo posted by Vital Vegas states that beginning Feb. 4, "All guest elevators at MGM Grand will be modified only to allow access to the floor to which the guest is registered."
- By Jessica Davis
- Feb 08, 2019
Brent Sutherland, director of facilities management for Rock Co., said that the idea of arming the guards was proposed by Global Security Services, which supplies guards for the courthouse.
- By Jessica Davis
- Feb 08, 2019
According to Renee Wynn, NASA’s Chief Information Officer, NASA’s Security Operations Center (SOC) continued to operate 24/7 during the government shutdown, fighting cybersecurity threats.
- By Jessica Davis
- Feb 07, 2019
After multiple incidents in Richmond, Kentucky, both Richmond and Eastern Kentucky University police are urging area residents to take extra caution. The warnings follow the death of a missing woman, Amanda Bailey, the ongoing search for another woman, Savannah Spurlock, and a reported sexual assault near EKU’s campus.
- By Jessica Davis
- Feb 07, 2019
Having the right cybersecurity solutions in place now will go a long way toward helping you recover from a ransomware attack later.
- By Patrick Luce
- Feb 07, 2019
David Smail Appointed Executive Vice President and Chief Legal Officer; P. Gray Finney To Retire
The city expects to share the new center with CPS Energy, San Antonio Water System and VIA Metropolitan Transit, according to the San Antonio Business Journal. For security purposes, the organizations’ data streams would be kept separate.
- By Jessica Davis
- Feb 06, 2019
In a blog post Tuesday, Google announced two new updates to help users protect their data: Password Checkup and Cross Account Protection.
- By Jessica Davis
- Feb 06, 2019
The Fort Myers City Council has begun discussion of enforcing a city ordinance requiring security guard presence at convenience stores. The ordinance is in place, but is not being enforced at this time.
- By Jessica Davis
- Feb 06, 2019
Indianapolis seeks feedback form the community, officers in newly launched study on body-worn cameras.
- By Sydny Shepard
- Feb 05, 2019
Several agencies work together to create a comprehensive security plan to protect the State of the Union.
- By Sydny Shepard
- Feb 05, 2019
Airbus has disclosed the company is the victim of a cyberattack.
- By Sydny Shepard
- Feb 04, 2019
A proposed ban in San Francisco has introduced a series of rules that could dramatically limit enhanced surveillance.
- By Sydny Shepard
- Feb 04, 2019
Problems at a downtown apartment building leads to discussions on hiring retired officers to keep the peace.
- By Sydny Shepard
- Feb 04, 2019
The way that smart cards are issued has changed dramatically in the last several years with the advent of cloud-based systems that enable the entire process to be managed and executed remotely, and with printer/encoder breakthroughs that significantly boost throughput, reliability and energy efficiency.
- By Robin Tandon
- Feb 01, 2019
Microwave sensors, also known as Radar, RF or Doppler sensors, detect walking, running or crawling human targets in outdoor environments.
- By Courtney Dillon Pedersen
- Feb 01, 2019
The government commands a lot of information in data centers, local municipalities, homeland security, health, and every touch that governments have with private citizens and companies. The data can be classified, private and public-facing as in forms.
- By Carrie Goetz
- Feb 01, 2019
The Internet of Things (IoT) promises greater connectivity, which, when properly leveraged, can provide invaluable insight into our organizations and our operational environments. In the security sector, increased connectivity between sensors and systems gives us access to more data than we thought possible even just a few years ago.
- By Jimmy Palatsoukas
- Feb 01, 2019
As with any high-profile entertainment complex that draws more than one million visitors every year, the stadium faces complex and constantly evolving security challenges.
- By John Burke
- Feb 01, 2019
There’s enormous opportunity for all enterprises in the cloud, and those in the middle market are taking note.
- By Andreas Pettersson
- Feb 01, 2019
Originally designed as consumer devices, smartphones have become vital elements of both our personal and professional lives. Unfortunately, as sources and repositories of our most sensitive data, smartphones have quickly become a primary attack surface for hackers, cybercriminals and foreign spies.