CyberSecurity


computer keyboard

With 4.1 Billion Records Exposed in Six Months, 2019 Is On Course To Be Record Year For Data Breaches

Only eight breaches were responsible for the exposure of 3.2 billion records in the first half of the year, according to new research.



texas capitol building

Ransomware Attacks Hit 23 Texas Towns, Prompting Statewide Response

The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”

open source vulnerability hacking

The Dangers of Open-Source Vulnerabilities, and What You Can Do About It

Neglecting basic security practices exposes companies to long-standing security threats.

capital one building

Alleged Capital One Hacker Stole From More Than 30 Other Organizations, Prosecutors Say

In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.

secure tablet

How Deception Technology Can Help You Detect Threats Early

Deploying automated decoys can help protect your network and reduce IT costs.

Rebuilding Trust After Cybersecurity Lapses

Rebuilding Trust After Cybersecurity Lapses

Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.

wifi router office

IoT Security: Current Threats and How to Overcome Them

Connecting devices to a 0G network is a simple fix to seemingly insurmountable challenges.

DHS Warns of ‘Tragedy-Related Scams’ After El Paso and Dayton Shootings

DHS Warns of ‘Tragedy-Related Scams’ After El Paso and Dayton Shootings

A Homeland Security agency and the FBI’s El Paso office are cautioning Americans to watch out for malicious "charity" emails and phone call scams.

cisco systems

Cisco Agrees to Pay Over $8 Million For Selling Video Surveillance System with Technical Flaws

Experts believe Cisco’s payout to a whistleblower could set a precedent for future lawsuits against vendors who sell products with security vulnerabilities.

Pelco Provides Meaningful Cybersecurity

At the Cyber:Secured Forum in Dallas, two Pelco employees broke down the "culture shift" from physical to cyber issues in the security industry.

Overcoming the Challenges of SecOps Implementation

Overcoming the Challenges of SecOps Implementation

Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.

A New Age in Corporate Accountability for Data Breaches

Why corporations owe it to you and society as a whole to stop data breaches and fraud

work wifi

10 Simple Steps to Take Right Now to Secure Your Business WiFi Network

Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network

man on computer

Combating Third-Party Excuses to Your Information Security Requests

How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests

At Cyber:Secured Forum, Cyber and Physical Security Professionals Tackle Integration Challenges

One topic seemed to dominate this year’s conference: the ongoing challenges of integrating physical security technologies with cybersecurity products.

Gaining Customer Trust

Gaining Customer Trust

Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.

Don’t Reinvent the Wheel

Don’t Reinvent the Wheel

As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a heavy reliance on the network.

capital one card

Capital One Breach Jeopardizes Data of Over 100 Million People

A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.

Featured

  • Teaching Old Dogs, New Tricks

    After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool. Read Now

  • Learning to be a Strategic Skeptic: Promoting Critical Thinking, Digital Literacy

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3