CyberSecurity


open source vulnerability hacking

The Dangers of Open-Source Vulnerabilities, and What You Can Do About It

Neglecting basic security practices exposes companies to long-standing security threats.



capital one building

Alleged Capital One Hacker Stole From More Than 30 Other Organizations, Prosecutors Say

In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.

secure tablet

How Deception Technology Can Help You Detect Threats Early

Deploying automated decoys can help protect your network and reduce IT costs.

Rebuilding Trust After Cybersecurity Lapses

Rebuilding Trust After Cybersecurity Lapses

Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.

wifi router office

IoT Security: Current Threats and How to Overcome Them

Connecting devices to a 0G network is a simple fix to seemingly insurmountable challenges.

DHS Warns of ‘Tragedy-Related Scams’ After El Paso and Dayton Shootings

DHS Warns of ‘Tragedy-Related Scams’ After El Paso and Dayton Shootings

A Homeland Security agency and the FBI’s El Paso office are cautioning Americans to watch out for malicious "charity" emails and phone call scams.

cisco systems

Cisco Agrees to Pay Over $8 Million For Selling Video Surveillance System with Technical Flaws

Experts believe Cisco’s payout to a whistleblower could set a precedent for future lawsuits against vendors who sell products with security vulnerabilities.

Pelco Provides Meaningful Cybersecurity

At the Cyber:Secured Forum in Dallas, two Pelco employees broke down the "culture shift" from physical to cyber issues in the security industry.

Overcoming the Challenges of SecOps Implementation

Overcoming the Challenges of SecOps Implementation

Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.

A New Age in Corporate Accountability for Data Breaches

Why corporations owe it to you and society as a whole to stop data breaches and fraud

work wifi

10 Simple Steps to Take Right Now to Secure Your Business WiFi Network

Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network

man on computer

Combating Third-Party Excuses to Your Information Security Requests

How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests

At Cyber:Secured Forum, Cyber and Physical Security Professionals Tackle Integration Challenges

One topic seemed to dominate this year’s conference: the ongoing challenges of integrating physical security technologies with cybersecurity products.

Gaining Customer Trust

Gaining Customer Trust

Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.

Don’t Reinvent the Wheel

Don’t Reinvent the Wheel

As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a heavy reliance on the network.

capital one card

Capital One Breach Jeopardizes Data of Over 100 Million People

A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.

small plane flying

Department of Homeland Security Issues Cybersecurity Warning for Small Planes

Planes using networked communication systems are particularly vulnerable to cyberattacks, according to a flaw discovered by researchers.

siri app

Apple Contractors Regularly Overhear ‘Confidential’ Conversations Through Siri, Whistleblower Says

An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.