CyberSecurity


New Fingerprint Technology Can Detect Cocaine Use

New Fingerprint Technology Can Detect Cocaine Use

Dr. Melanie Bailey is a fellow of the Engineering and Physical Sciences Research Council (EPSRC). Her team has identified differences between the fingerprints of people who touched cocaine compared with those who have ingested the drug, even if the hands are not washed.



Technology counts on AI to authenticate and identify people

Always Surrounded

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.

DoD Needs to Invest More in Innovation

Numerous commissions, studies and papers continue to point to the stifling effects of the DoD procurement system on production, efficiency, and innovation as well as lead to bloated price tags like the F-35.

Lessons Learned from Oldsmar Water Plant Hack

Lessons Learned from Oldsmar Water Plant Hack

Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.

Actionable Intelligence

There is no doubt that Artificial Intelligence (AI) is here to stay, as new AI-driven solutions are pervasive across every category of professional and consumer electronics today.

Current and future uses in the commercial security industry

On a Cloud of its Own

Cloud-based technology and solutions have become more and more mainstream, especially in the commercial security industry.

Data Theorem Launches Industry’s First App-Aware Full Stack Cloud Security Product

Data Theorem Inc., today introduced the industry’s first application-aware full stack cloud security product with attack surface management (ASM) for protecting data in cloud-native apps, API services and serverless cloud functions.

Transforming the Industry

Transforming the Industry

Artificial Intelligence (AI) continues to gain momentum every day, and it is already poised to augment and enrich many aspects of our business and personal lives.

Learn to Walk Before Running

Learn to Walk Before Running

Today’s analytics are not only better able to differentiate between true security incidents and false alarms, but can be programmed to trigger when a given event occurs.

Passing Prop 24

Passing Prop 24

Supporters of Prop. 24 posited the CCPA privacy law, even though it had just gone into effect earlier in the year, wasn’t strong enough.

Biden Signs Executive Order calling for Semiconductor Supply Chain Review

Biden Signs Executive Order calling for Semiconductor Supply Chain Review

President Biden has signed another executive order addressing growing concern over a global semiconductor shortage.

Lessons Learned from the Capitol Breach: Immediate Next Steps

Much of the U.S. Capital’s cybersecurity infrastructure must now be considered suspect, given the recent attack, and possible physical and cyber breach of systems, networks and devices.

Injection Attacks Thwarted Since August; The Minerva Approach Proves Itself Once Again

Minerva Labs has announced that the company conducted a thorough review of the cybersecurity threat exposed by the SolarWinds breach.

Scaling Security with GPUs/DPUs for AI and Machine Learning

Scaling Security with GPUs/DPUs for AI and Machine Learning

On March 25, before the full impact of coronavirus hit home and the world was still full of hope, Google News showed an eye-wateringly appealing headline: Cybercrime Gangs Promise to Stop Attacks on Healthcare Organizations During the COVID-19 Crisis.

Can Zero Trust Be Trusted

It’s no surprise that cyber security defenses took their first cues from the physical world. Castles have moats. Your house has a door with a lock. It makes sense to protect your network with a firewall. But cyber criminals soon crashed that plane.

Holiday Security Tips for Malls or Outdoor Shopping Areas

Holiday Security Tips for Malls or Outdoor Shopping Areas

The holiday shopping season is here, let’s not forget that we are in COVID-19 pandemic and health officials continue to repeat their messages about the importance of masks, adequate social distancing, and frequent handwashing.

Chinese-made routers, sold on Amazon and eBay, contain hidden backdoor and are being exploited by Mirai malware and other methods

CyberNews.com’s Investigations team today announced that they have identified hidden backdoors in Chinese-manufactured routers that share common firmware, with evidence that the routers are being exploited by the Mirai malware.

Election Security Separating Rumor from Reality

Election Security: Separating Rumor from Reality

Here is a Q&A that answers questions about spoofing the voter. The answers come from Chris Krebbs, CISA director.

Acting Secretary Chad Wolf Condemns Censorship of Government Officials as a Security Threat, Calls on Twitter to End it

In an open letter to Twitter CEO Jack Dorsey, Department of Homeland Security (DHS) Acting Secretary Chad F. Wolf today called on Twitter to no longer obstruct Americans’ unalienable right to communicate with each other, their government, and its officials on the platform, because doing so endangers the national security.

Voting Security: Did Your Vote Count?

Voting Security: Did Your Vote Count?

The most recent elections is the most secure in the nation’s history. Or, is it? Government officials say it is the most secure ever.

Featured

  • ESX 2025 Announces Expanded Schedule of Events

    ESX has announced its dynamic 2025 schedule, set to provide an unparalleled experience for professionals in the electronic security and life safety industry. Taking place June 16-19 at the Cobb Galleria Centre, this year’s event features an expanded lineup of educational sessions, hands-on workshops, inspiring main stage speakers, networking opportunities, and an engaging expo floor showcasing the latest technology. Read Now

  • City of New Orleans Launches NOLA Ready Public Safety App Before Super Bowl

    The City of New Orleans Office of Homeland Security and Emergency Preparedness (NOHSEP) is pleased to announce the official launch of the NOLA Ready Public Safety App, powered by Motorola Solutions. This new mobile application is designed to enhance public safety and emergency preparedness for both residents and visitors. All individuals planning to attend major events in New Orleans, including the Super Bowl, Mardi Gras, and other large gatherings, are encouraged to download the app. Read Now

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.