CyberSecurity


Why Protecting Your Tax Data Is More Important than Ever

Why Protecting Your Tax Data Is More Important than Ever

In recent years a disturbing new trend is on the rise – cybercrime relating to tax returns and tax-related data. For its victims, Tax Day represents inconvenience and loss.



DDoS downfall: How the IoT is Becoming the Internet of Very Bad Things

DDoS Downfall: How the IoT is Becoming the Internet of Very Bad Things

This age of connectivity is the age of possibility, and millions of people all over the world are taking advantage of the wonderful benefits these devices have to offer.

How to Operationalize Security with Enterprise Wide Engagement

How to Operationalize Security with Enterprise-Wide Engagement

How to Prevent Breaches, Not Just Clean Up the Mess

Educating End Users

As a provider of storage for video surveillance systems, the hardest part of my job is educating end-users, integrators and consultants on the best way to purchase storage for their systems.

Seriously Cybersecurity Insurance

The thought of a network or individual cameras getting hacked brought cybersecurity into the security picture pretty quickly. Cyber questions also arise when discussing cameras being manufactured in China.

Live From ISC West 2017 Now Available

Live From ISC West 2017 Now Available

The live webpage will frequently update with content from the show floor.

If You Build It, They will Come - IoT Driven Botnet Attacks

If You Build It, They Will Come - IoT Driven Botnet Attacks

Regardless of term, or use case, it’s well-known that cybercriminals can hack into any vulnerable device connected to the internet to remotely take control of that device and enslave it into a botnet that is part of a distributed denial-of-service (DDoS) attack.

Reports of Potential Data Breach at Saks Fifth Ave

Reports of Potential Data Breach at Saks Fifth Ave

Over the weekend, Saks Fifth Ave reported that customers’ data may be exposed.

FBI Director: No Evidence of Wiretap

FBI Director: No Evidence of Wiretap

In a hearing with the Intelligence Committee, FBI Director James Comey said there was no evidence to support President Trump’s tweets claiming Trump Tower was wiretapped by former President Obama.

Why is the Security Industry Failing?

Why is the Security Industry Failing?

We have failed to focus on what’s most important: building security in.

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung will finally offer monthly security updates.

Stopping the Post-EMV Surge in Online Fraud

Stopping the Post-EMV Surge in Online Fraud

The predicted increase in online fraud in the U.S. has arrived with the adoption of chip card technology.

4 Charged in Yahoo Data Breach

4 Charged in Yahoo Data Breach

Four people, including two officers from Russian security services, were charged by the U.S. in the massive data breach that plagued Yahoo.

FCC Investigating Nationwide 911 Outage for AT&T Users

FCC Investigating Nationwide 911 Outage for AT&T Users

Users of AT&T’s wireless network found themselves without the ability to call 911 last night.

Ransomware Rundown: What Businesses Need to Know

Ransomware Rundown: What Businesses Need to Know

Today as the cybersecurity landscape continues to evolve at breakneck speed, so do the threats, and the amount of data we have sitting with the different organizations we deal with is growing each day.

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks released thousands of documents that it said described hacking methods of the CIA.

Milestone Sets Out to Make the World See

Milestone Sets Out to Make the World See

Milestone Systems is the number one VMS worldwide, but they are searching for more.

Cloudflare Bug Leak Puts Corporate Companies at Risk

Cloudflare Bug Puts Corporate Companies at Risk

Software bug at an internet-service provider sparks privacy and security concerns.

Security Tight for Super Bowl Sunday

Security Tight for Super Bowl Sunday

Local, federal, state and private security officials are teaming up to create a security stronghold that protects a three mile area around the stadium.

The Cloud Keeps Evolving in 2017

The Cloud Keeps Evolving in 2017

Earlier in 2016, when Gartner analysts stated that by 2020, 80 percent of all software will be offered on a subscription basis—this did not come as surprise to us at Genetec.

Featured

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Webinars

Whitepapers

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3