CyberSecurity


What’s Trending for 2018

What’s Trending for 2018

Technology is perpetual motion personified. It is always marching forward, striving to become smarter, faster, more resilient, and more efficient than its predecessor.



Moving the Discussion Forward

Moving the Discussion Forward

Only a few years ago, the inevitable shift to all things Cloud was met with guarded optimism. But today, the shift is really happening.

5 Ways to Protect Your Accounts from Hackers

5 Ways to Protect Your Accounts from Hackers

Being online puts you and your data at risk, but there are ways you can minimize your risk and make a hacker’s job harder.

Top 5 Tips to Prevent Data Breaches

Top 5 Tips to Prevent Data Breaches

With hacks, attacks, ransoms and even extortion attempts, 2017 has been the year of data breaches, and it’s not even over yet.

"Gray Saturday" Safer for Online Shopping

"Gray Saturday" Safer for Online Shopping

Kaspersky Lab’s review of phishing attacks during the holiday sales season found that the number of phishing attacks can decrease by as much as 33 percent on the day after Black Friday.

Vulnerability in Amazon Key

Vulnerability in Amazon Key's Camera Allows Couriers Back in Your House

Amazon has addressed the hack and will be rolling out an update next week.

Trump Administration Releases VEP Charter to Increase Transparency

The Trump Administration released a new 14-page charter Wednesday detailing the Vulnerabilities Equities Process (VEP), which the federal government uses to determine if, how and when it tells private companies about zero-day security flaws.

Google Details New Pixel 2 Security Module

Google Details New Pixel 2 Security Module

The goal of the new security module, Google said, is to prevent attackers from decrypting your data without knowing your password by reinforcing the lock screen against attacks.

3 Toys NOT to Buy Your Kids This Holiday Season

3 Toys NOT to Buy Your Kids This Holiday Season

Connected toys may excite kids, but parents need to be wary.

Hackers Trick Face ID with 3-D Printed Mask

Hackers Trick Face ID with 3-D Printed Mask

Days after the iPhone X’s official release, hackers in Vietnam have successfully tricked Face ID and unlocked the smartphone with a 3-D-printed mask.

Boeing 757 Hacked by DHS in Test

Boeing 757 Hacked by DHS in Test

According to Robert Hickey, aviation program manager within the Cyber Security Division of the DHS Science and Technology (S&T) Directorate, the hack was conducted last year on a 757 parked at the airport in Atlantic City, N.J.

Survey Reveals Serious IoT Concerns

Survey Reveals Serious IoT Concerns

The survey was based on responses from 603 IT and line-of-business decision-makers involved in enterprise security teams across the US, UK, Germany, France, Australia and New Zealand.

iOS 11 Security and Privacy Settings to Check Right Now

iOS 11 has some settings you should adjust to keep a tighter lid on your online privacy and security.

Trump Account Deactivation Raises Twitter Security Questions

Trump Account Deactivation Raises Twitter Security Questions

The temporary deactivation Thursday of the personal Twitter account of President Donald Trump, @realDonaldTrump, by a customer support employee on their last day of employment has raised questions about Twitter’s internal security.

Data Breaches That Will Haunt You

Data Breaches That Will Haunt You

This year has been filled with some of the biggest data breaches in history, which is a truly horrific thought.

Three Technologies That Will Change Your Business

3 Security Technologies to Invest Time in Researching

How researching and investing in these three technologies will change your business

3 Online Tools to Help Businesses Prevent Cyberattacks

3 Online Tools to Help Businesses Prevent Cyberattacks

Without these online tools, your business could be vulnerable to cyberattacks risking the information of your employees and customers.

Ransomware Targets Transit and Goverment Organizations in Ukraine, Russia

Ransomware Targets Transit and Goverment Organizations in Ukraine, Russia

A new ransomware called Bad Rabbit (variant of Petya) is spreading through Ukraine and Russia.

Bank of America Boosts Online Security with Biometrics

Bank of America Boosts Online Security with Biometrics

Bank of America will start using an additional layer of authentication for online banking.

How to be Effective in the Wake of a Cyberattack

How to be Effective in the Wake of a Cyberattack

Helping you be prepared if an attack happens

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3