CyberSecurity


Security by Default: 5 Principles for Building More Secure Apps

Security by Default: 5 Principles for Building More Secure Apps

Here are five principles that developers should keep in mind to create more secure apps



Three Cybersecurity Must-Haves for Small Businesses

Three Cybersecurity Must-Haves for Small Businesses

Tips and tactics for ensuring your small business is safe from the threat of cyberattacks.

USPS Security Flaw Exposes Personal Data of 60 Million People

USPS Security Flaw Exposes Personal Data of 60 Million People

A security hole in a mail preview program may have made the data of 60 million customers vulnerable.

Employee Cybersecurity Habits Worsen

Employee Cybersecurity Habits Worsen

According to the survey, three of every four respondents admitted that they reuse passwords across accounts, an increase from the 56 percent of respondents who admitted the same in the survey’s 2014 edition.

Security Vulnerabilities in Top Christmas Gifts

Security Vulnerabilities in Top Christmas Gifts

Internet connected devices might be the hot item for Christmas this year, but are they secure?

Cybersecurity Tips for Holiday Shoppers

Cybersecurity Tips for Holiday Shoppers

Recommendations for safe online holiday shopping - a cybersecurity perspective.

Fraud Attempts Expected to Spike During Holiday Shopping Season

Fraud Attempts Expected to Spike During Holiday Shopping Season

Beware holiday shoppers. Attempts at fraud will peak on Thanksgiving Day this year.

NY Hospital Security Breach Shows Vulnerabilities in Healthcare Cybersecurity

NY Hospital Security Breach Shows Vulnerabilities in Healthcare Cybersecurity

SUNY Upstate Hospital announced a former employee inappropriately accessed more than 1,200 patient records.

U.S. Doesn

U.S. Doesn't Sign Macron's Cybersecurity Pact

A new cyberspace pact was signed by 51 other countries, 224 companies and 92 non-profits and advocacy groups.

25 Worst Passwords of All Time

25 Worst Passwords of All Time

To help you rule out the worst password ideas, FrontNet has put together a list of the 25 words passwords on the internet for 2018.

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

The company said Wednesday that large, enterprise firms were most likely to focus on cybersecurity and AI. Small and midsize firms are more likely to prioritize DevOps skills, experience with end-user hardware and IT infrastructure proficiency.

Microsoft Wants to Work with Trump Administration on Cybersecurity

Microsoft Wants to Work with Trump Administration on Cybersecurity

At the 2018 Web Summit this week in Lisbon, Portugal, Microsoft president Brad Smith said the company wanted to work on a solution to protect civilians against cyber threats. According to Smith, concerns include the role of AI in the future of work and cyber threats to democracy.

Researchers Find Security Flaws in Popular Data Storage Devices

Researchers Find Security Flaws in Popular Data Storage Devices

Researchers found a malicious expert can bypass existing protection mechanisms and access the data without knowing the user-chosen password.

Facebook Fallout: Private Messages from 81,000 Accounts for Sale

Facebook Fallout: Private Messages from 81,000 Accounts for Sale

It’s thought that the private message data was obtained via a malicious browser extension that scraped the data from users’ accounts. The hackers claimed to sell access to the information for 10 cents per account.

Major Security Flaw Found in Bluetooth Chips

Enterprise Security: Major Flaws Found in Bluetooth Chips

Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.

Only Half of All Fortune 500 are Bolstering Email Security

Only Half of All Fortune 500 are Bolstering Email Security

Agari’s data shows that 51 percent of the Fortune 500, the world’s wealthiest companies, are using DMARC, an improvement from about one-third of them a year ago.

Apple Introduces New Touch ID and Security Chip to MacBook

Apple Introduces New Touch ID and Security Chip to MacBook Air

Apple's new security chip now disables MacBook's microphone when the lid closes.

FIFA Hacked Again, Expected Release of Private Information

FIFA Hacked Again, Expected Release of Private Information

FIFA is bracing for the release of private information following another cyber attack.

Girl Scouts Hacked: 2,800 Members Impacted

Girl Scouts Hacked: 2,800 Members Impacted

The Girl Scouts of Orange County have been involved in an email hack.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3