CyberSecurity


U.K. Reveals New Law to Improve IoT Security

U.K. Reveals New Law to Improve IoT Security

The U.K. government is looking to step up IoT security against cybercriminals.



D.C. Metro Vulnerable to Cyber Attacks

D.C. Metro Vulnerable to Cyber Attacks

The inspector general believes D.C.'s transportation system is at a higher risk of cybersecurity attacks.

Security at Scale—With Great Success Often Comes Great Security Problems

Security at Scale—With Great Success Often Comes Great Security Problems

Some common areas and issues to keep growing your business, not your security risk.

Army Considers More Multi-Factor Authentication Measures

Army Considers More Multi-Factor Authentication Measures

The U.S. Army is working toward adding more authentication measures to provide more options to access Army online resources while maintaining information technology system security.

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Hospitals are often in the news due to data breaches, and email hacks are often the cause.

How to Execute a SOC 2 Report — From Planning to Distribution

How to Execute a SOC 2 Report — From Planning to Distribution

Many companies are employing System and Organization Controls reports before procuring vendors' services.

This California Health Network Was Just Hacked for the Third Time

This California Health Network Was Just Hacked for the Third Time

What went wrong?

Six Updates Companies Need to Make to Modernize Their Cybersecurity

Six Updates Companies Need to Make to Modernize Their Cybersecurity

Six things you can do to be proactive against potential cyber crimes.

Are Voice-Enabled Devices Prioritizing Convenience Over Security?

Are Voice-Enabled Devices Prioritizing Convenience Over Security?

Are voice-enabled devices making you more vulnerable to cyberattack?

Airlines Are The Next Big Targets For Cybercrime

Airlines Are The Next Big Targets For Cybercrime

No one really knows why airlines have become a target as of late but with the rate of attacks this high, something is definitely going on.

Data Exposed on Amazon Cloud Service: Facebook Has Messed Up Again

Data Exposed on Amazon Cloud Service: Facebook Has Messed Up Again

Facebook is in trouble again.

10 Tips for Keeping Your Personal Data Safe on Social Media

10 Tips for Keeping Your Personal Data Safe on Social Media

Strong passwords, two-factor authentication and good cyber hygiene will keep your personal information protected while browsing popular social media accounts.

Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota's servers in Japan have been hacked, leaving millions of pieces of data left vulnerable.

Automation Can Close the Gap on Cyber Exposures

Automation Can Close the Gap on Cyber Exposures

See no evil, hear no evil, speak no evil: It is tempting for physical security professionals to take this passive approach to cybersecurity.

An Iron Solution

An Iron Solution

One of the primary criteria for any surveillance, access or security system is the requirement for a consistent and reliable power source, as even the most complex and expensive system solutions will be rendered useless if power is interrupted.

Managed Firewall Services

Managed Firewall Services

As cybercrime continues to plague companies of all sizes, across all industries both public and private, we wanted to take this opportunity to explore options that can help protect your data and your business.

Data Breach Exposes Data of Thousands of Medical Marijuana Patients

Data Breach Exposes Data of Thousands of Medical Marijuana Patients

The breach exposed diagnostic results, healthcare numbers and personal contact information.

Change Your Facebook Password Now

Change Your Facebook Password Now

Everyone should be changing their Facebook passwords after it was discovered all use passwords have been left unencrypted and searchable in plaintext.

2FA Immune Phishing Attacks Are on the Rise

2FA Immune Phishing Attacks Are on the Rise

2FA is more secure than single-factor methods only requiring a password, but it's not an impenetrable method.

How to Troubleshoot a DNS Leak

How to Troubleshoot a DNS Leak

DNS leaks can be a surprisingly common issue and are often only noticed when actively looked for.

Featured

  • Teaching Old Dogs, New Tricks

    After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool. Read Now

  • Learning to be a Strategic Skeptic: Promoting Critical Thinking, Digital Literacy

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3