CyberSecurity


zoom phone

Video Conferencing Software Zoom Faces Scrutiny Over Hacks, Abusive Behavior During Meetings

The spread of “Zoombombing,” or hijacking a meeting room with abusive images or speech, has grown in scope as more Americans turn to teleconferencing for classroom instruction and workplace meetings.



marriott sign

Marriott Discloses Second Security Breach, Affecting Millions, In Two Years

The hack took place through Marriott Bonvoy, the company's loyalty app, and affected up to 5.2 million guests.

spam email inbox

Research: Americans Should Watch Out For Hacking Campaigns Related to Stimulus Bill, Economic Recovery

Cyber attackers have already attempted to profit off of spam websites selling fake coronavirus cures. Now, hackers will turn toward Americans’ thirst for information about stimulus checks and financial aid.

who flag

World Health Organization Facing Cyber Attacks During Coronavirus Response

A malicious site imitating the WHO’s email system was created to collect the account information of the organization’s employees.

justice department

Justice Department Takes First Legal Action Against Coronavirus Scam Websites

A federal judge granted a temporary restraining order to have a website selling fake vaccine kits shut down immediately.

cybersecurity map

Facing Down Cybersecurity and Operational Challenges Caused By Coronavirus Crisis

Businesses will have to tackle issues with supply chains and staffing in the coming months. Here’s how to make sure your organization can withstand the COVID-19 crisis.

nutribullet pic

Hackers Steal Credit Card Data From NutriBullet Customers Through Magecart Attacks

The attacks, which targeted NutriBullet’s official website, were acknowledged by the company but it’s not clear whether affected customers will be notified.

people using phones

Israel Moves to Track Cell Phone Location Data To Prevent Spread of Coronavirus

The U.S. and tech companies are contemplating a similar step, though the American version of cell phone tracking would likely include aggregated data and more privacy protections.

HHS website

Cyber Attack Hits Department of Health and Human Services Amid Government Coronavirus Response

HHS officials said no personal data was accessed and the attack was not successful. But it could be a sign of things to come during the coronavirus pandemic.

Attorney General Directs Department of Justice to Crack Down on Coronavirus Scammers, Cyber Criminals

In a memo to attorney’s offices across the country, William Barr said that federal law enforcement should prioritize investigating and prosecuting crimes related to the pandemic.

drone in field

Trump Administration Preparing Executive Order to Ban Use of Foreign-Made Drones by Government Agencies

Chinese manufacturer DJI, which accounts for about 70 percent of the global drone market, stands to lose the most from a ban, which is based on national security concerns.

coronavirus illustration

High Number of Recently Created Coronavirus Websites Linked to Scamming Operations

Americans need to be on the lookout for malicious domains created by scammers as well as widespread disinformation and conspiracy theories being spread online.

Despite Technical Issues, DHS Claims Victory on Super Tuesday With No Foreign Hacking Attempts

There was no significant increase in disinformation campaigns or hacking attempts like there were in 2016, according to top Homeland Security officials.

walgreens store

Flaw in Walgreens App Exposes Prescription Data for Some Mobile Users

The pharmacy would not say how many people had been affected by the error, but said that prescription data and customers’ names were part of the leaked information.

Trucking fleets may be the next targets of ransomware

The Next Victims

Among the common types of cybersecurity attacks perpetrated on enterprises, arguably none are as sophisticated, effective or lucrative as ransomware is today.

Secure Your Containers

Development and deployment of container-based software has become a popular movement in technology.

Validate Your Security Model

Validate Your Security Model

As security threats grow in complexity and scale, organizations are spending major resources to address the threats and minimize risk, including hiring top security talent and purchasing sevenfigure security solutions.

Common Mistakes

As the cyber threat landscape has matured and evolved, cybersecurity incidents have become a regular occurrence.

Policy Bill Includes Cyber Investments

Data on OTAs and prototypes. The House proposed an annual reporting requirement on how the Defense Department is using OTAs.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.