CyberSecurity


Data Breaches That Will Haunt You

Data Breaches That Will Haunt You

This year has been filled with some of the biggest data breaches in history, which is a truly horrific thought.



Three Technologies That Will Change Your Business

3 Security Technologies to Invest Time in Researching

How researching and investing in these three technologies will change your business

3 Online Tools to Help Businesses Prevent Cyberattacks

3 Online Tools to Help Businesses Prevent Cyberattacks

Without these online tools, your business could be vulnerable to cyberattacks risking the information of your employees and customers.

Ransomware Targets Transit and Goverment Organizations in Ukraine, Russia

Ransomware Targets Transit and Goverment Organizations in Ukraine, Russia

A new ransomware called Bad Rabbit (variant of Petya) is spreading through Ukraine and Russia.

Bank of America Boosts Online Security with Biometrics

Bank of America Boosts Online Security with Biometrics

Bank of America will start using an additional layer of authentication for online banking.

How to be Effective in the Wake of a Cyberattack

How to be Effective in the Wake of a Cyberattack

Helping you be prepared if an attack happens

Researchers Find Ways to Boost Security of Voice Control

Researchers Find Ways to Boost Security of Voice Control

Voice activated systems are vulnerable to hacking. Researchers from Michigan have found ways to bolster their security.

Vulnerability in Children

Vulnerability in Children's Smart Watch Could Reveal Location

Some smart watches geared towards children have series security flaws.

DHS Demands Basic Email Security

DHS Demands Basic Email Security

DHS will issue a "binding directive" which will require the implementaion of security measures for email.

University Hack Leaves Professors

University Hack Leaves Professors' Data Vulnerable

A University of Kansas student was able to use a keystroke logger to gain access to a professor's computers and change his grades.

Security Flaw Leaves Wi-Fi Devices Vulnerable to Hackers

Security Flaw Leaves Wi-Fi Devices Vulnerable to Hackers

The hole in Wi-Fi security affects the vast majority of Wi-Fi devices and networks.

Equifax Website Breach: Compromised or Collateral Damage?

Equifax Website Breach: Compromised or Collateral Damage?

Oops!...Equifax did it again.

The Majority Employees Don’t Know Best Cybersecurity Practices

The Majority Employees Don't Know Best Cybersecurity Practices

According to a new study, 70 percent of employees cannot grasp web security and privacy.

All 3 Billion Yahoo Users Have Been Hacked

All 3 Billion Yahoo Users Have Been Hacked

Yahoo recieved new information to show that all the accounts had been hacked, not just a portion as previously thought.

How Your Organization Can Avoid Getting Hacked

How Your Organization Can Avoid Getting Hacked

It seems we can’t go a single day without a new data breach making headlines.

Using the Cloud

Using the Cloud

Today, cloud applications are all the rage and for good reason. The cloud allows us to work and play in ways that are so much more productive and engaging.

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

As new technologies emerge, ever-vigilant fraudsters remain hard at work searching for and exploiting system weaknesses before they can be patched.

Whole Foods Investigating Credit Card Security Breach

Whole Foods Investigating Credit Card Security Breach

The grocery chain has "recieved information reguarding unauthorized access of payment card information."

Equifax Confirms Another

Equifax Confirms Another 'Security Incident'

Equifax says the two breaches are unrelated.

Hidden Backdoor in CCleaner Security App Has Infected 2.3 Million People

Hidden Backdoor in CCleaner Security App Has Infected 2.3 Million People

Hackers have hidden a backdoor in a security application called CCleaner. So far it has 2 billion downloads and has infected 2.3 million people and counting.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.