CyberSecurity


Apple Adds USB Security Key Support in Latest Safari Preview

Apple Adds USB Security Key Support in Latest Safari Preview

Users can enable a feature in the preview version of Safari that lets them log in with USB-based CTAP2 sticks, which offer more stringent protection than a standard text-based password.



Mozilla and ThingsCon Launch IoT Security Certification Mark

Mozilla and ThingsCon Launch IoT Security Certification Mark

Mozilla and ThingsCon announced Thursday the launch of the Trustable Technology Mark, designed to help customers tell if an Internet of Things-connected device is designed with strict privacy and security measures.

Cybersecurity: Simple Tips to Protect Yourself

Cybersecurity: Simple Tips to Protect Yourself

Simply employing the most basic of information security rules will make you and your business more safe and secure.

Quora Says 100 Million Users Breached in Security Incident

Quora Says 100 Million Users Breached in Security Incident

The names, email addresses and passwords of 100 million users of Quora have been made vulnerable.

Shifting Towards the Cloud

Shifting Towards the Cloud

Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.

Dunkin

Dunkin' Donuts Reward Program Users' Data Made Vulnerable

The coffee chain says hackers might have accessed customer info through a data breach.

The Evolution of Endpoint Security Demands Detection and Response

The Evolution of Endpoint Security Demands Detection and Response

Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats

New Zealand Bars Chinese Firm’s 5G Rollout Due to Security Concerns

New Zealand Bars Chinese Firm’s 5G Rollout Due to Security Concerns

Huawei, the world’s biggest producer of telecoms equipment, has faced pushback from governments due to concerns that its technology could be used for unsavory purposes such as spying.

Security by Default: 5 Principles for Building More Secure Apps

Security by Default: 5 Principles for Building More Secure Apps

Here are five principles that developers should keep in mind to create more secure apps

Three Cybersecurity Must-Haves for Small Businesses

Three Cybersecurity Must-Haves for Small Businesses

Tips and tactics for ensuring your small business is safe from the threat of cyberattacks.

USPS Security Flaw Exposes Personal Data of 60 Million People

USPS Security Flaw Exposes Personal Data of 60 Million People

A security hole in a mail preview program may have made the data of 60 million customers vulnerable.

Employee Cybersecurity Habits Worsen

Employee Cybersecurity Habits Worsen

According to the survey, three of every four respondents admitted that they reuse passwords across accounts, an increase from the 56 percent of respondents who admitted the same in the survey’s 2014 edition.

Security Vulnerabilities in Top Christmas Gifts

Security Vulnerabilities in Top Christmas Gifts

Internet connected devices might be the hot item for Christmas this year, but are they secure?

Cybersecurity Tips for Holiday Shoppers

Cybersecurity Tips for Holiday Shoppers

Recommendations for safe online holiday shopping - a cybersecurity perspective.

Fraud Attempts Expected to Spike During Holiday Shopping Season

Fraud Attempts Expected to Spike During Holiday Shopping Season

Beware holiday shoppers. Attempts at fraud will peak on Thanksgiving Day this year.

NY Hospital Security Breach Shows Vulnerabilities in Healthcare Cybersecurity

NY Hospital Security Breach Shows Vulnerabilities in Healthcare Cybersecurity

SUNY Upstate Hospital announced a former employee inappropriately accessed more than 1,200 patient records.

U.S. Doesn

U.S. Doesn't Sign Macron's Cybersecurity Pact

A new cyberspace pact was signed by 51 other countries, 224 companies and 92 non-profits and advocacy groups.

25 Worst Passwords of All Time

25 Worst Passwords of All Time

To help you rule out the worst password ideas, FrontNet has put together a list of the 25 words passwords on the internet for 2018.

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

The company said Wednesday that large, enterprise firms were most likely to focus on cybersecurity and AI. Small and midsize firms are more likely to prioritize DevOps skills, experience with end-user hardware and IT infrastructure proficiency.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3