CyberSecurity


Are Contractors Ready for DOD’s Cybersecurity Framework?

Are Contractors Ready for DOD’s Cybersecurity Framework?

Contractors will face big changes and tight timelines next year when the Defense Department institutes its new Cyber Maturity Model Certification framework



Expanding Cybersecurity Solutions

Expanding Cybersecurity Solutions

Under GDPR, companies can be fined for not having their records in order, not notifying the supervising authority and those affected by a breach, or not conducting an impact assessment.

AI Beyond the Hype

AI Beyond the Hype

Today, there are in-depth discussions about what ‘might be’ possible with AI, machine and deep learning-based analytics products on the market.

Delivery App DoorDash Becomes Latest Company To Suffer Data Breach Affecting Millions

Delivery App DoorDash Becomes Latest Company To Suffer Data Breach Affecting Millions

4.9 million users have been affected by the data breach, which DoorDash discovered in the past month.

Senate Approves Legislation Dedicated To Assisting Governments, Private Sector With Cyber Attacks

Senate Approves Legislation Dedicated To Assisting Governments, Private Sector With Cyber Attacks

The chamber also approved funding for the Department of Homeland Security’s cyber arm, with $1 billion dedicated solely to cybersecurity.

House Lawmakers Introduce Bill Offering Refunds to Small Companies Moving Away From Huawei Tech

House Lawmakers Introduce Bill Offering Refunds to Small Companies Moving Away From Huawei Tech

The bill is part of an ongoing saga between China-based Huawei and the federal government, which believes Huawei is collaborating with Chinese spying efforts.

Chinese Scientists Develop Camera That Can Capture Thousands of Faces in

Chinese Scientists Develop Camera That Can Capture Thousands of Faces in 'Perfect Detail'

The new system may advance the country’s widespread use of surveillance technology in public spaces.

U.S. Soldier Arrested For Allegedly Threatening To Attack News Network, Distributing Instructions For Building Explosives

U.S. Soldier Arrested For Allegedly Threatening To Attack News Network, Distributing Instructions For Building Explosives

Jarrett William Smith gave detailed instructions about how to build an explosive device to an undercover FBI agent, according to a criminal complaint filed Monday.

Microsoft Now Plans To Offer Free Security Updates to Election Officials Using Windows 7

Microsoft Now Plans To Offer Free Security Updates to Election Officials Using Windows 7

The company originally planned to phase out security patches for Windows 7 in January. Now, Microsoft will continue issuing free updates for election systems around the world.

Senate Committee Allocates $250 Million To Bolster State Election Security

Senate Committee Allocates $250 Million To Bolster State Election Security

The fight over increased funding for election security is far from over, though: The House and Senate still need to agree on a number for the final version of the bill.

London Police Partner With Facebook to Prevent Live Streaming of Terrorist and Firearm Attacks

London Police Partner With Facebook to Prevent Live Streaming of Terrorist and Firearm Attacks

The issue gained renewed attention after a mass shooter used Facebook to live stream his murder of over 50 people at a mosque in Christchurch, New Zealand.

Colorado Becomes First State to Stop Using QR Codes, Barcodes to Count Ballots

Colorado Becomes First State to Stop Using QR Codes, Barcodes to Count Ballots

The state said it would redevelop its vote tallying system so that voting machines no longer print receipts with QR codes, which Secretary of State Jena Griswold says could be hacked.

Millions of Americans’ Medical Images Were Left Unprotected on The Web, Report Finds

Millions of Americans’ Medical Images Were Left Unprotected on The Web, Report Finds

A new investigation discovered that the medical images and health data of more than 5 million patients in the U.S. was readily accessible on the web without a password or login.

Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Hackers are targeting IT service providers as a means of attacking dozens of organizations at once and potentially reaping bigger financial rewards.

Treasury Department Implements Sanctions on North Korean Cyber Groups

Treasury Department Implements Sanctions on North Korean Cyber Groups

The department announced the sanctions Friday after it said that North Korean intelligence groups targeted American critical infrastructure, particularly the financial system.

Multitude of Ransomware Attacks Cause Lawmakers to Take Notice

Multitude of Ransomware Attacks Cause Lawmakers to Take Notice

Lawmakers are working to find a solution that will help counter ransomware attacks, which are affecting school districts and municipal governments.

Google Works to Eliminate Spam Invites for More Than 1 Billion Users

Google Works to Eliminate Spam Invites for More Than 1 Billion Users

Google is working to keep unwanted and malicious content from its users.

Stanley Security GSX booth 2019

Live from GSX 2019: Day 1

Security management systems for businesses large and small were the talk of GSX exhibitors.

5 Common Phishing Attacks and How To Protect Yourself Against Them

5 Common Phishing Attacks and How To Protect Yourself Against Them

Phishing scams continues to be a widespread problem for businesses and individuals alike. But there are several ways to recognize that you could be getting scammed.

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

A database that was left without password protection was discovered by a security researcher, who said 419 million records of Facebook user phone numbers were exposed.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3