CyberSecurity


Cybersecurity: Simple Tips to Protect Yourself

Cybersecurity: Simple Tips to Protect Yourself

Simply employing the most basic of information security rules will make you and your business more safe and secure.



Quora Says 100 Million Users Breached in Security Incident

Quora Says 100 Million Users Breached in Security Incident

The names, email addresses and passwords of 100 million users of Quora have been made vulnerable.

Shifting Towards the Cloud

Shifting Towards the Cloud

Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.

Dunkin

Dunkin' Donuts Reward Program Users' Data Made Vulnerable

The coffee chain says hackers might have accessed customer info through a data breach.

The Evolution of Endpoint Security Demands Detection and Response

The Evolution of Endpoint Security Demands Detection and Response

Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats

New Zealand Bars Chinese Firm’s 5G Rollout Due to Security Concerns

New Zealand Bars Chinese Firm’s 5G Rollout Due to Security Concerns

Huawei, the world’s biggest producer of telecoms equipment, has faced pushback from governments due to concerns that its technology could be used for unsavory purposes such as spying.

Security by Default: 5 Principles for Building More Secure Apps

Security by Default: 5 Principles for Building More Secure Apps

Here are five principles that developers should keep in mind to create more secure apps

Three Cybersecurity Must-Haves for Small Businesses

Three Cybersecurity Must-Haves for Small Businesses

Tips and tactics for ensuring your small business is safe from the threat of cyberattacks.

USPS Security Flaw Exposes Personal Data of 60 Million People

USPS Security Flaw Exposes Personal Data of 60 Million People

A security hole in a mail preview program may have made the data of 60 million customers vulnerable.

Employee Cybersecurity Habits Worsen

Employee Cybersecurity Habits Worsen

According to the survey, three of every four respondents admitted that they reuse passwords across accounts, an increase from the 56 percent of respondents who admitted the same in the survey’s 2014 edition.

Security Vulnerabilities in Top Christmas Gifts

Security Vulnerabilities in Top Christmas Gifts

Internet connected devices might be the hot item for Christmas this year, but are they secure?

Cybersecurity Tips for Holiday Shoppers

Cybersecurity Tips for Holiday Shoppers

Recommendations for safe online holiday shopping - a cybersecurity perspective.

Fraud Attempts Expected to Spike During Holiday Shopping Season

Fraud Attempts Expected to Spike During Holiday Shopping Season

Beware holiday shoppers. Attempts at fraud will peak on Thanksgiving Day this year.

NY Hospital Security Breach Shows Vulnerabilities in Healthcare Cybersecurity

NY Hospital Security Breach Shows Vulnerabilities in Healthcare Cybersecurity

SUNY Upstate Hospital announced a former employee inappropriately accessed more than 1,200 patient records.

U.S. Doesn

U.S. Doesn't Sign Macron's Cybersecurity Pact

A new cyberspace pact was signed by 51 other countries, 224 companies and 92 non-profits and advocacy groups.

25 Worst Passwords of All Time

25 Worst Passwords of All Time

To help you rule out the worst password ideas, FrontNet has put together a list of the 25 words passwords on the internet for 2018.

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

Cybersecurity, AI Skills to Dominate IT Staff Hires in 2019

The company said Wednesday that large, enterprise firms were most likely to focus on cybersecurity and AI. Small and midsize firms are more likely to prioritize DevOps skills, experience with end-user hardware and IT infrastructure proficiency.

Microsoft Wants to Work with Trump Administration on Cybersecurity

Microsoft Wants to Work with Trump Administration on Cybersecurity

At the 2018 Web Summit this week in Lisbon, Portugal, Microsoft president Brad Smith said the company wanted to work on a solution to protect civilians against cyber threats. According to Smith, concerns include the role of AI in the future of work and cyber threats to democracy.

Researchers Find Security Flaws in Popular Data Storage Devices

Researchers Find Security Flaws in Popular Data Storage Devices

Researchers found a malicious expert can bypass existing protection mechanisms and access the data without knowing the user-chosen password.

Featured

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.