CyberSecurity


iOS 11 Security and Privacy Settings to Check Right Now

iOS 11 has some settings you should adjust to keep a tighter lid on your online privacy and security.



Trump Account Deactivation Raises Twitter Security Questions

Trump Account Deactivation Raises Twitter Security Questions

The temporary deactivation Thursday of the personal Twitter account of President Donald Trump, @realDonaldTrump, by a customer support employee on their last day of employment has raised questions about Twitter’s internal security.

Data Breaches That Will Haunt You

Data Breaches That Will Haunt You

This year has been filled with some of the biggest data breaches in history, which is a truly horrific thought.

Three Technologies That Will Change Your Business

3 Security Technologies to Invest Time in Researching

How researching and investing in these three technologies will change your business

3 Online Tools to Help Businesses Prevent Cyberattacks

3 Online Tools to Help Businesses Prevent Cyberattacks

Without these online tools, your business could be vulnerable to cyberattacks risking the information of your employees and customers.

Ransomware Targets Transit and Goverment Organizations in Ukraine, Russia

Ransomware Targets Transit and Goverment Organizations in Ukraine, Russia

A new ransomware called Bad Rabbit (variant of Petya) is spreading through Ukraine and Russia.

Bank of America Boosts Online Security with Biometrics

Bank of America Boosts Online Security with Biometrics

Bank of America will start using an additional layer of authentication for online banking.

How to be Effective in the Wake of a Cyberattack

How to be Effective in the Wake of a Cyberattack

Helping you be prepared if an attack happens

Researchers Find Ways to Boost Security of Voice Control

Researchers Find Ways to Boost Security of Voice Control

Voice activated systems are vulnerable to hacking. Researchers from Michigan have found ways to bolster their security.

Vulnerability in Children

Vulnerability in Children's Smart Watch Could Reveal Location

Some smart watches geared towards children have series security flaws.

DHS Demands Basic Email Security

DHS Demands Basic Email Security

DHS will issue a "binding directive" which will require the implementaion of security measures for email.

University Hack Leaves Professors

University Hack Leaves Professors' Data Vulnerable

A University of Kansas student was able to use a keystroke logger to gain access to a professor's computers and change his grades.

Security Flaw Leaves Wi-Fi Devices Vulnerable to Hackers

Security Flaw Leaves Wi-Fi Devices Vulnerable to Hackers

The hole in Wi-Fi security affects the vast majority of Wi-Fi devices and networks.

Equifax Website Breach: Compromised or Collateral Damage?

Equifax Website Breach: Compromised or Collateral Damage?

Oops!...Equifax did it again.

The Majority Employees Don’t Know Best Cybersecurity Practices

The Majority Employees Don't Know Best Cybersecurity Practices

According to a new study, 70 percent of employees cannot grasp web security and privacy.

All 3 Billion Yahoo Users Have Been Hacked

All 3 Billion Yahoo Users Have Been Hacked

Yahoo recieved new information to show that all the accounts had been hacked, not just a portion as previously thought.

How Your Organization Can Avoid Getting Hacked

How Your Organization Can Avoid Getting Hacked

It seems we can’t go a single day without a new data breach making headlines.

Using the Cloud

Using the Cloud

Today, cloud applications are all the rage and for good reason. The cloud allows us to work and play in ways that are so much more productive and engaging.

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

As new technologies emerge, ever-vigilant fraudsters remain hard at work searching for and exploiting system weaknesses before they can be patched.

Whole Foods Investigating Credit Card Security Breach

Whole Foods Investigating Credit Card Security Breach

The grocery chain has "recieved information reguarding unauthorized access of payment card information."

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3