CyberSecurity


Chinese Military Members Charged With 2017 Hacking of Equifax

U.S. prosecutors say that four members of the People’s Liberation Army were involved in the hacking, which exposed the sensitive data of more than 147 million people.



cyber attack

New Data Shows Sharp Rise in Ransomware Attacks, Payments Demanded From Hackers

Ransomware attacks hit at least over 200,000 organizations last year, and the average ransom demanded rose dramatically at the end of 2019.

open source code

Open-Source Security in 2020: Myths and Facts

Open-source software isn’t a completely chaotic and breached wasteland of vulnerabilities. It’s a global effort to make the development lifecycle faster.

plane flying from boston airport

Research: Only Three Top International Airports Pass Basic Cybersecurity Checks

A cybersecurity firm conducted basic testing on the top 100 airports’ public websites and mobile apps. No U.S. airports passed it, and only three European airports did.

McAfee: Lack of Verified Election Websites Could Pose Cybersecurity Issues For 2020 Election

McAfee’s survey of 13 states considered “critical” in the presidential election found that 83 percent lacked .GOV validation, which verifies websites as being run by official local governments.

Facebook Agrees to Pay Out $550 Million in Settlement of Facial Recognition Lawsuit

Thanks to an Illinois privacy law, eligible users will soon be able to apply for payments from Facebook for using facial scans without permission.

nist building

Federal Institute Releases Guidelines For How To Respond To Ransomware Attacks

The report, prepared by the National Institute of Standards and Technology, tested a variety of cybersecurity solutions in different IT environments to find out which methods were most effective in fighting ransomware.

facial recognition system

Facial Recognition App Used By Law Enforcement To Identify Suspects Faces Blowback

New Jersey police are banned from using Clearview AI’s app, and Twitter has demanded that the small company delete any photos collected from its website.

campaign signs

Technology Companies Sign On To Offer Free or Discounted Cybersecurity Services to Campaigns

Seventeen companies, including Microsoft and Cloudflare, are offering security assistance to federal campaigns that often cannot afford the services themselves.

Ifrah Yousuf graphic of computer

Cyber-Insurance Rates Soaring Thanks to Rise in High-Cost Ransomware Attacks

Insurers have made “dramatic” increases in premiums for cyber-insurance and are considering lowering the ransom amounts they will pay.

iowa democratic party

Despite Hacking Threats, Iowa and Nevada Democratic Caucuses Will Use Mobile Apps to Tally Votes

Party leaders say they have taken steps to protect cybersecurity and that there will be paper records to verify each vote for the final results.

maryland state house

Ransomware Possession Would Become A Crime In Maryland Under Proposed Legislation

Lawmakers are trying to deter would-be hackers from carrying out cyber attacks that have paralyzed companies, hospital systems and local governments, including Baltimore’s city government.

Report: Rise Of “Conversation-Hijacking” Phishing Attacks Threatens Businesses

Because the technique involves impersonating a trusted employee, the hacking method has the potential to be unusually effective.

brain scan

More Than One Billion Medical Images Remain Unprotected On The Web

Some security experts and lawmakers have criticized the Department of Health and Human Services for failing to enforce privacy laws and fine organizations that did not protect patient records.

2020 computing

The IoT Rundown For 2020: Stats, Risks, and Solutions

Weak passwords, insecure network services and a lack of secure update mechanisms top the list of risks for companies utilizing IoT technology.

capitol hill

New Bill Would Update Children’s Online Privacy Law In Wake Of YouTube, TikTok Controversies

The bipartisan measure would allow parents to delete information collected by companies about their kids and raise the age of parental consent protection from 13 to 16.

TikTok app

TikTok Fixes Cybersecurity Flaws That Could Have Allowed Hackers to Upload, Delete Videos

Following the disclosure of several security issues, TikTok issued a patch to ensure that user privacy was protected.

fbi seal

FBI Warns U.S. Companies About Recent Scourge of “Maze” Ransomware Attacks

The advisory warned businesses about cyber attacks featuring cryptocurrency sites and spam campaigns impersonating government agencies.

cloud computing

Leverage the Cloud for Event Security

Technology advances have made security and access management more efficient.

department of homeland security flag

DHS Warns of Iran’s Potential To Retaliate With Cyber Attacks, Terrorist Acts After Soleimani Killing

The department warned in an alert that Iran has a “robust cyber program” and can carry out attacks to temporarily disrupt critical infrastructure.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3