CyberSecurity


Reports of Potential Data Breach at Saks Fifth Ave

Reports of Potential Data Breach at Saks Fifth Ave

Over the weekend, Saks Fifth Ave reported that customers’ data may be exposed.



FBI Director: No Evidence of Wiretap

FBI Director: No Evidence of Wiretap

In a hearing with the Intelligence Committee, FBI Director James Comey said there was no evidence to support President Trump’s tweets claiming Trump Tower was wiretapped by former President Obama.

Why is the Security Industry Failing?

Why is the Security Industry Failing?

We have failed to focus on what’s most important: building security in.

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung will finally offer monthly security updates.

Stopping the Post-EMV Surge in Online Fraud

Stopping the Post-EMV Surge in Online Fraud

The predicted increase in online fraud in the U.S. has arrived with the adoption of chip card technology.

4 Charged in Yahoo Data Breach

4 Charged in Yahoo Data Breach

Four people, including two officers from Russian security services, were charged by the U.S. in the massive data breach that plagued Yahoo.

FCC Investigating Nationwide 911 Outage for AT&T Users

FCC Investigating Nationwide 911 Outage for AT&T Users

Users of AT&T’s wireless network found themselves without the ability to call 911 last night.

Ransomware Rundown: What Businesses Need to Know

Ransomware Rundown: What Businesses Need to Know

Today as the cybersecurity landscape continues to evolve at breakneck speed, so do the threats, and the amount of data we have sitting with the different organizations we deal with is growing each day.

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks released thousands of documents that it said described hacking methods of the CIA.

Milestone Sets Out to Make the World See

Milestone Sets Out to Make the World See

Milestone Systems is the number one VMS worldwide, but they are searching for more.

Cloudflare Bug Leak Puts Corporate Companies at Risk

Cloudflare Bug Puts Corporate Companies at Risk

Software bug at an internet-service provider sparks privacy and security concerns.

Security Tight for Super Bowl Sunday

Security Tight for Super Bowl Sunday

Local, federal, state and private security officials are teaming up to create a security stronghold that protects a three mile area around the stadium.

The Cloud Keeps Evolving in 2017

The Cloud Keeps Evolving in 2017

Earlier in 2016, when Gartner analysts stated that by 2020, 80 percent of all software will be offered on a subscription basis—this did not come as surprise to us at Genetec.

Making IP Video Cyber Secure

Financial institutions have been historically slow to adopt IP video surveillance citing concerns about possibly compromising network security.

Stop Lingering

Security threats are on the rise and as IT security teams increase their scrutiny of all network-connected devices, it’s time for some new thinking about the design and maintenance of building security systems.

Hacker Tells POTUS to Change Twitter Security Settings

Hacker Tells POTUS to Change Twitter Security Settings

A hacker just wants President Trump to change his security settings on Twitter.

Inauguration Security: Washington Prepared for Anything

Inauguration Security: Washington Prepared for Anything

Washington D.C. Police along with Secret Service and the FBI have been working to secure the Presidential Inauguration for over a year.

Trump Choses Rudy Giuliani to Meet with Companies on Cybersecurity

Trump Picks Rudy Giuliani to Meet with Companies on Cybersecurity

President-Elect chooses Rudy Giuliani to hold private industry meetings on cybersecurity.

2017: The Year Encryption Goes Wild

2017: The Year Encryption Goes Wild

Maybe it’s time for a different (and maybe more affordably efficient) approach.

While these topics may seem somewhat disparate, there is actually a common thread amongst them: They all have security officers and end users concerned.

Single Sign-On and a Secure Portal

While these topics may seem somewhat disparate, there is actually a common thread among them: They all have security officers and end users concerned.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3