CyberSecurity


Are Voice-Enabled Devices Prioritizing Convenience Over Security?

Are Voice-Enabled Devices Prioritizing Convenience Over Security?

Are voice-enabled devices making you more vulnerable to cyberattack?



Airlines Are The Next Big Targets For Cybercrime

Airlines Are The Next Big Targets For Cybercrime

No one really knows why airlines have become a target as of late but with the rate of attacks this high, something is definitely going on.

Data Exposed on Amazon Cloud Service: Facebook Has Messed Up Again

Data Exposed on Amazon Cloud Service: Facebook Has Messed Up Again

Facebook is in trouble again.

10 Tips for Keeping Your Personal Data Safe on Social Media

10 Tips for Keeping Your Personal Data Safe on Social Media

Strong passwords, two-factor authentication and good cyber hygiene will keep your personal information protected while browsing popular social media accounts.

Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota and Lexus Dealerships Hacked, Millions Left Vulnerable

Toyota's servers in Japan have been hacked, leaving millions of pieces of data left vulnerable.

Automation Can Close the Gap on Cyber Exposures

Automation Can Close the Gap on Cyber Exposures

See no evil, hear no evil, speak no evil: It is tempting for physical security professionals to take this passive approach to cybersecurity.

An Iron Solution

An Iron Solution

One of the primary criteria for any surveillance, access or security system is the requirement for a consistent and reliable power source, as even the most complex and expensive system solutions will be rendered useless if power is interrupted.

Managed Firewall Services

Managed Firewall Services

As cybercrime continues to plague companies of all sizes, across all industries both public and private, we wanted to take this opportunity to explore options that can help protect your data and your business.

Data Breach Exposes Data of Thousands of Medical Marijuana Patients

Data Breach Exposes Data of Thousands of Medical Marijuana Patients

The breach exposed diagnostic results, healthcare numbers and personal contact information.

Change Your Facebook Password Now

Change Your Facebook Password Now

Everyone should be changing their Facebook passwords after it was discovered all use passwords have been left unencrypted and searchable in plaintext.

2FA Immune Phishing Attacks Are on the Rise

2FA Immune Phishing Attacks Are on the Rise

2FA is more secure than single-factor methods only requiring a password, but it's not an impenetrable method.

How to Troubleshoot a DNS Leak

How to Troubleshoot a DNS Leak

DNS leaks can be a surprisingly common issue and are often only noticed when actively looked for.

Facebook Stored Hundreds of Millions of Passwords Unencrypted

Facebook Stored Hundreds of Millions of Passwords Unencrypted

Facebook stored “hundreds of millions” of account passwords unencrypted and viewable as plain text to tens of thousands of company employees, KrebsonSecurity reported Thursday.

Insider Threats: How to Stop the Most Common and Damaging Security Risk You Face

Insider Threats: How to Stop the Most Common and Damaging Security Risk You Face

Since each insider threat is very different, preventing them is challenging.

Being Unprepared is Not an Option

Being Unprepared is Not an Option

What does the future hold for audit and compliance?

Equifax Tells Canadians to do More to Protect their Data

Equifax Tells Canadians to do More to Protect their Data

Despite their new image as a failed cybersecurity company, Equifax is warning Canadians to do more to protect their data.

Security Staff Are Adopting Biometrics But Can Do More to Eliminate the Password

Security Staff Are Adopting Biometrics But Can Do More to Eliminate the Password

A survey found that security professionals are making the move to biometrics, but that they could be doing more to protect data.

Congress Introduces Bill to Improve IoT Security

Congress Introduces Bill to Improve IoT Security

The Internet of Things Cybersecurity Improvement Act aims to establish a bare minimum of security standards for IoT devices used by the federal government

Three Million Vehicles Vulnerable After Security Flaw Found in Car Alarms

Three Million Vehicles Vulnerable After Security Flaw Found in Car Alarms

Vulnerabilities found in two different car alarms left three million vehicles susceptible to hijack globally.

New System Uses Machine Learning to Scan Tweets for Security Flaws

New System Uses Machine Learning to Scan Tweets for Security Flaws

Machine learning and Twitter could be the future of catching security flaws and vulnerabilities early.

Featured

  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West
  • New Report Says 1 in 5 SMBs Would Be Forced to Shutter After Successful Cyberattack

    Small and medium-sized businesses (SMBs) play a crucial role in the U.S. economy, making up 99.9% of all businesses and contributing to half of the nation's GDP. However, these vital economic growth drivers face an escalating threat—cyberattacks that could put them out of business. Read Now

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.