CyberSecurity


Colorado Becomes First State to Stop Using QR Codes, Barcodes to Count Ballots

Colorado Becomes First State to Stop Using QR Codes, Barcodes to Count Ballots

The state said it would redevelop its vote tallying system so that voting machines no longer print receipts with QR codes, which Secretary of State Jena Griswold says could be hacked.



Millions of Americans’ Medical Images Were Left Unprotected on The Web, Report Finds

Millions of Americans’ Medical Images Were Left Unprotected on The Web, Report Finds

A new investigation discovered that the medical images and health data of more than 5 million patients in the U.S. was readily accessible on the web without a password or login.

Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Hackers are targeting IT service providers as a means of attacking dozens of organizations at once and potentially reaping bigger financial rewards.

Treasury Department Implements Sanctions on North Korean Cyber Groups

Treasury Department Implements Sanctions on North Korean Cyber Groups

The department announced the sanctions Friday after it said that North Korean intelligence groups targeted American critical infrastructure, particularly the financial system.

Multitude of Ransomware Attacks Cause Lawmakers to Take Notice

Multitude of Ransomware Attacks Cause Lawmakers to Take Notice

Lawmakers are working to find a solution that will help counter ransomware attacks, which are affecting school districts and municipal governments.

Google Works to Eliminate Spam Invites for More Than 1 Billion Users

Google Works to Eliminate Spam Invites for More Than 1 Billion Users

Google is working to keep unwanted and malicious content from its users.

Stanley Security GSX booth 2019

Live from GSX 2019: Day 1

Security management systems for businesses large and small were the talk of GSX exhibitors.

5 Common Phishing Attacks and How To Protect Yourself Against Them

5 Common Phishing Attacks and How To Protect Yourself Against Them

Phishing scams continues to be a widespread problem for businesses and individuals alike. But there are several ways to recognize that you could be getting scammed.

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

A database that was left without password protection was discovered by a security researcher, who said 419 million records of Facebook user phone numbers were exposed.

Democratic National Committee Rejects Plans To Hold ‘Virtual Caucuses’ in Iowa and Nevada, Citing Security Concerns

Democratic National Committee Rejects Plans To Hold ‘Virtual Caucuses’ in Iowa and Nevada, Citing Security Concerns

Facing criticism over low voter turnout and barriers to caucusing, party officials planned for remote caucuses in 2020. But the national Democratic Party said the methods would expose the process to high cybersecurity risks.

3 Major Internet Privacy Issues and How to Avoid Them

3 Major Internet Privacy Issues and How to Avoid Them

Information mishandling, snooping and location tracking are often the ways in which users find their privacy violated online.

Deploying IoT Devices

Deploying IoT Devices

The number and breadth of devices that make up the Internet of Things (IoT) continues to grow rapidly, with everything from kitchen appliances to video surveillance and access control systems offering the ability to connect to a network.

Security by Design

Security by Design

We know by now that there is an abundance of business advantages in the cloud — it’s agile and cost-efficient, and, with little to no hardware maintenance, it’s easier to update and perform maintenance on than traditional on-site servers.

5 Questions for Your Cloud Provider

5 Questions for Your Cloud Provider

Do you want the real bottom line in providing cloud services for video, access control and other integrated services?

Path to the Future

Path to the Future

Security professionals face many challenges in selecting video surveillance systems that address their unique needs.

voting booth in 2016

Government Officials Worry That Ransomware Attacks Could Derail 2020 Elections

The Department of Homeland Security is preparing to launch an education program on the potential of ransomware attacks targeting voter databases, some of which were compromised by Russian hackers in 2016.

cyber attack written on newspaper

Report: Insurance Companies Are Exacerbating Rise in Ransomware Attacks

A ProPublica investigation found that the decision by insurers to pay hackers instead of encouraging victims to recover files by themselves is helping fuel a surge in ransomware.

department of homeland security flag

Federal Cybersecurity Agency Prioritizes Addressing Chinese Threats, Improving Election Security

The leader of the Cybersecurity and Infrastructure Agency, which works within DHS, is concerned primarily with risk management, Chinese threats to supply chains and election security.

department of justice

Justice Department Indicts 80 People in Massive Online Fraud and Money Laundering Scheme

Two Nigerian citizens are accused of leading a massive fraud scheme that transferred at least $6 million in fraudulently-obtained funds, much of whom was taken from elderly people.

laptop cybersecurity

Five Surprising Trends in Cybersecurity

The impact of GDPR, the increasing number of issues with shadow IT and the more advanced solutions for IoT devices are among the most surprising trends.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.