CyberSecurity


Capitol Hill at sunset

Industry Groups Push For More Cybersecurity Funding In Future COVID-19 Stimulus Legislation

With high numbers of ransomware attacks and increased threats due to teleworking, advocacy groups want Congress to prioritize cybersecurity funds to local and state governments.



new york capitol

New York State Responded to Cyber Attack on Government Servers Weeks Before Coronavirus Pandemic Hit

Officials handled an attack that disabled access to state agency databases just a few weeks before the state became the epicenter of the COVID-19 crisis.

security guard

Demand for Security Guards, Cybersecurity Workers Remains High Amid Coronavirus Pandemic

Security companies are scrambling to hire guards and IT workers as businesses worry about break-ins to closed properties and cybersecurity issues associated with working remotely.

5G cell tower

New Government Strategy for 5G Security Sets Stage for Domestic Rollout

Franco Zaro of Valid breaks down new government efforts to establish a 5G security strategy and public paranoia about the wireless infrastructure.

google coronavirus

Apple and Google Team Up For Coronavirus Tracing App, Sparking Privacy Concerns

The app will make it easier for individuals and public health officials to track the spread of COVID-19, but privacy rights groups are pushing for transparency.

security shield

How to Enhance Public Safety With Emerging Technologies

Security leaders are investing in advanced technologies like artificial intelligence, biometric solutions and advanced communication networks.

fbi front

FBI Warns Financial Institutions To Beware of Coronavirus-Related Scams

Business email compromise attacks continue to be effective, tricking victims into transferring funds to fraudulent accounts.

Avoiding Danger with Secure Data Storage

Avoiding Danger with Secure Data Storage

While CCPA is meant to enhance privacy rights and consumer protection for the residents of California, as with many laws enacted in the state, it will impact most businesses across the country and the rest of the world.

security operations center

Establishing IT Infrastructure Through Security Operations Centers

How to improve client and employee trust, collaborate across departments and reduce costs through SOCs

google classroom

Google Facing Lawsuit Over Collection of Facial Scans, Personal Data From Children

School districts are increasingly turning to Google for online classroom tools during the coronavirus pandemic, but the company has faced scrutiny for the data it collects on students.

zoom building

Zoom CEO Vows To Improve Privacy, Cybersecurity Issues After User Criticisms

After experiencing an unprecedented growth in users over the course of a month, the video conferencing app is hoping to address complaints of “Zoombombing” and improper data collection.

zoom phone

Video Conferencing Software Zoom Faces Scrutiny Over Hacks, Abusive Behavior During Meetings

The spread of “Zoombombing,” or hijacking a meeting room with abusive images or speech, has grown in scope as more Americans turn to teleconferencing for classroom instruction and workplace meetings.

marriott sign

Marriott Discloses Second Security Breach, Affecting Millions, In Two Years

The hack took place through Marriott Bonvoy, the company's loyalty app, and affected up to 5.2 million guests.

spam email inbox

Research: Americans Should Watch Out For Hacking Campaigns Related to Stimulus Bill, Economic Recovery

Cyber attackers have already attempted to profit off of spam websites selling fake coronavirus cures. Now, hackers will turn toward Americans’ thirst for information about stimulus checks and financial aid.

who flag

World Health Organization Facing Cyber Attacks During Coronavirus Response

A malicious site imitating the WHO’s email system was created to collect the account information of the organization’s employees.

justice department

Justice Department Takes First Legal Action Against Coronavirus Scam Websites

A federal judge granted a temporary restraining order to have a website selling fake vaccine kits shut down immediately.

cybersecurity map

Facing Down Cybersecurity and Operational Challenges Caused By Coronavirus Crisis

Businesses will have to tackle issues with supply chains and staffing in the coming months. Here’s how to make sure your organization can withstand the COVID-19 crisis.

nutribullet pic

Hackers Steal Credit Card Data From NutriBullet Customers Through Magecart Attacks

The attacks, which targeted NutriBullet’s official website, were acknowledged by the company but it’s not clear whether affected customers will be notified.

people using phones

Israel Moves to Track Cell Phone Location Data To Prevent Spread of Coronavirus

The U.S. and tech companies are contemplating a similar step, though the American version of cell phone tracking would likely include aggregated data and more privacy protections.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3