Neglecting basic security practices exposes companies to long-standing security threats.
- By Gilad David Maayan
- Aug 19, 2019
In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.
- By Haley Samsel
- Aug 16, 2019
Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.
- By Haley Samsel
- Aug 13, 2019
Deploying automated decoys can help protect your network and reduce IT costs.
- By Gilad David Maayan
- Aug 12, 2019
Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.
- By Bud Broomhead
- Aug 08, 2019
The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.
- By Haley Samsel
- Aug 08, 2019
Connecting devices to a 0G network is a simple fix to seemingly insurmountable challenges.
A Homeland Security agency and the FBI’s El Paso office are cautioning Americans to watch out for malicious "charity" emails and phone call scams.
- By Haley Samsel
- Aug 07, 2019
Experts believe Cisco’s payout to a whistleblower could set a precedent for future lawsuits against vendors who sell products with security vulnerabilities.
- By Haley Samsel
- Aug 06, 2019
At the Cyber:Secured Forum in Dallas, two Pelco employees broke down the "culture shift" from physical to cyber issues in the security industry.
- By Ralph C. Jensen
- Aug 06, 2019
Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.
- By Gilad David Maayan
- Aug 06, 2019
Why corporations owe it to you and society as a whole to stop data breaches and fraud
- By Simon Marchand
- Aug 05, 2019
Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network
- By Yotam Gutman
- Aug 05, 2019
How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests
- By Evan Francen
- Aug 02, 2019
One topic seemed to dominate this year’s conference: the ongoing challenges of integrating physical security technologies with cybersecurity products.
- By Haley Samsel
- Aug 01, 2019
Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.
- By Christina Luttrell
- Aug 01, 2019
As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a heavy reliance on the network.
- By Moses Anderson
- Aug 01, 2019
A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.
- By Haley Samsel
- Jul 31, 2019
Planes using networked communication systems are particularly vulnerable to cyberattacks, according to a flaw discovered by researchers.
- By Haley Samsel
- Jul 31, 2019
An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.
- By Haley Samsel
- Jul 30, 2019