CyberSecurity


drone above mountain

Interior Department Grounds Entire Drone Fleet Due to Chinese Cyberattack Concerns

All of the drones used by the department were either manufactured in China or use parts that were made in the country, sparking concerns about potential hacking threats.



Apple building

Major Companies Pledge To Take Steps Toward Building Cybersecurity Workforce

Large employers like Google, Facebook, Johnson & Johnson and Apple have committed to closing the gap of cybersecurity jobs.

jack o lantern

What’s Scarier Than Halloween Night? The Rise of Scammers and Security Breaches in 2019

The horror stories of scammers targeting landline phone numbers and the elderly continue to pile up. Here are the steps that phone companies and governments could take to stop the madness.

Federal Trade Commission

FTC Bans Company From Selling ‘Stalkerware’ Monitoring Apps

Retina-X’s apps posed several security risks to users thanks to lax data protections and loopholes that allowed mobile devices to be monitored without the user’s knowledge.

Ohio Governor Mike DeWine in 2018

Ohio Creates ‘Cyber Reserve’ To Respond to Ransomware Attacks Across State

The reserve will be comprised of volunteer cybersecurity experts who will work with the state national guard to help local governments.

TikTok app

Senators Ask U.S. Intelligence To Investigate Potential Security Risks of TikTok and Chinese-Owned Companies

Chuck Schumer and Tom Cotton sent a letter to the director of national intelligence expressing concerns about ByteDance, which owns the video app TikTok.

data security

How to Prevent Data Loss in 2020

There are several data loss prevention solutions available in the market. Here’s how to tailor those software solutions to your company.

computer at work

Why CEOs of Small Businesses Are Prime Target for Hackers

Cyberattacks are targeting corporations and individuals alike. Here’s how companies can stay more secure on the web.

Capitol Hill at sunset

'Cyber Shield Act’ Aims To Establish Cybersecurity Standards for IoT Devices

The bill, introduced by Democratic legislators on Tuesday, would direct a committee to create security benchmarks and then give labels to products who meet those standards.

using laptop work

Younger Workers More Relaxed About Cybersecurity Than Older Counterparts, Survey Finds

Different generations approach technology at work in vastly different ways, the report found.

Amazon Echo speaker

Researchers: Google and Amazon Smart Speakers Are Vulnerable to Phishing, Eavesdropping Hacks

A group of security researchers found that applications for Google Home and Alexa could be used to obtain passwords and overhear conversations from unsuspecting users.

Senator Ron Wyden of Oregon

Senate Bill Would Impose Steep Fines, Potential Jail Time For Executives Who Violate Data Privacy Rules

Sen. Ron Wyden, a staunch advocate of increased cybersecurity regulations, introduced the legislation as part of an effort to track how companies collect and share customer data.

How These Web Application Security Vulnerabilities Could Be Affecting Your Business

How These Web Application Security Vulnerabilities Could Be Affecting Your Business

When companies don’t follow basic security practices, they leave themselves vulnerable.

pitney bowes building

Shipping Giant Pitney Bowes’ Services Stalled by Ransomware Attack

The company, which serves over 1.5 million clients, has been able to get some services back online but is still working to address the damage.

Incident Response in the Age of Intelligent Bots

Incident Response in the Age of Intelligent Bots

How security teams can improve their defense strategy by integrating bots

Medical Data of 1 Million New Zealanders Potentially Exposed in Health System Breach

Medical Data of 1 Million New Zealanders Potentially Exposed in Health System Breach

The health organization realized during an investigation of an August breach that its systems had been breached several times prior to the known attack.

Study: 66 Percent of Small Businesses Worldwide Have Faced Cyberattacks in The Past Year

Study: 66 Percent of Small Businesses Worldwide Have Faced Cyberattacks in The Past Year

For the third year in a row, SMBs are reporting big increases in the frequency of cybersecurity attacks.

Attorney General Pressures Facebook To Delay End-To-End Encryption, Citing Child Abuse Concerns

Attorney General Pressures Facebook To Delay End-To-End Encryption, Citing Child Abuse Concerns

Law enforcement are increasingly worried about the possibility of end-to-end encryption, which does not provide police with a way to access communications between potential suspects.

Justice Apologizes For Iowa Court System Authorizing Security Vulnerability Testing That Led To Break-Ins

Justice Apologizes For Iowa Court System Authorizing Security Vulnerability Testing That Led To Break-Ins

At a legislative hearing Friday, court administrators answered questions about their decision to hire “penetration testers” who were arrested for burglary last month.

Microsoft: Iranian Hackers Targeted Email Accounts of Presidential Campaign, U.S. Officials

Microsoft: Iranian Hackers Targeted Email Accounts of Presidential Campaign, U.S. Officials

Over 200 accounts were targeted by the group of hackers, but only four were compromised, according to Microsoft.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.