CyberSecurity


Hacker Tells POTUS to Change Twitter Security Settings

Hacker Tells POTUS to Change Twitter Security Settings

A hacker just wants President Trump to change his security settings on Twitter.



Inauguration Security: Washington Prepared for Anything

Inauguration Security: Washington Prepared for Anything

Washington D.C. Police along with Secret Service and the FBI have been working to secure the Presidential Inauguration for over a year.

Trump Choses Rudy Giuliani to Meet with Companies on Cybersecurity

Trump Picks Rudy Giuliani to Meet with Companies on Cybersecurity

President-Elect chooses Rudy Giuliani to hold private industry meetings on cybersecurity.

2017: The Year Encryption Goes Wild

2017: The Year Encryption Goes Wild

Maybe it’s time for a different (and maybe more affordably efficient) approach.

While these topics may seem somewhat disparate, there is actually a common thread amongst them: They all have security officers and end users concerned.

Single Sign-On and a Secure Portal

While these topics may seem somewhat disparate, there is actually a common thread among them: They all have security officers and end users concerned.

Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security firm LogRhythm has predicted the internet will shut down for 24 hours in 2017 due to a massive DDoS attack.

Top Security Innovations at CES 2017

Top Security Innovations at CES 2017

The annual Consumer Electronics Show had many security companies showing off their latest innovations.

Biggest Security Incidents of 2016

Biggest Security Incidents of 2016

Vehicle attacks, hacks and police ambushes make the list of top physical security events of 2016.

Guide for Protecting your Company against Insider Threats

Guide for Protecting your Company against Insider Threats

Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.

2017 Encryption Landscape

2017 Encryption Landscape

There is a growing belief that 2017 will be a decisive year in the battle over encryption that has been quietly raging for over 25 years.

Yahoo Hacked… Again

Yahoo Hacked... Again

Yahoo said 1 billion accounts were affected in the 2013 hack.

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics' mobile application was hacked leaving the health information of about 34,000 people vulnerable.

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Several routers, including those in the popular “Nighthawk” series, are affected.

Best Practices for Securing Documents

Best Practices for Securing Documents

Exploring basic best practices for securing documents on your computer and smartphone

Tech Giants Create Database for Terrorist Content

Tech Giants Create Database for Terrorist Content

Facebook, YouTube, Twitter and Microsoft are collaborating to crackdown on terrorist content on their platforms.

Facebook Isn

Online Exclusive: Facebook Isn't Safe!

Close the door on Locky ransomware infection via Facebook

Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Online Exclusive: Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Leveraging artificial intelligence and machine learning allows organizations to enjoy real time protection and risk identification, significantly reducing security risks without the need to increase staff.

Snowden Leak Caused ‘Tremendous’ Damage to U.S. Security

Snowden Leak Caused 'Tremendous Damage' to U.S. Security

A U.S. House committee issued a scathing report accusing Snowden of causing damage to U.S. security.

3 Ways iOS 10 Brings Security to Your iPhone

3 Ways iOS 10 Brings Security to Your iPhone

The top iPhone features that guard your privacy and security.

4 Critical Components of Tomorrow’s Cyber Security Incident Response

4 Critical Components of Tomorrow's Cyber Security Incident Response

Each of these four key components are essential in establishing a solid defense against would-be cyber-attacks.

Featured

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

  • Interface Systems Enhances Safety and Communication at Texas Church and School

    Interface Systems, a managed service provider delivering business security, actionable insights, and purpose-built networks for multi-location businesses, today announced the successful completion of a major security upgrade for Bethesda Community Church and Bethesda Christian School in Fort Worth, Texas. Read Now

  • ASIS International Introduces ANSI-Approved School Security Standard

    ASIS International, a leading authority in security standards, is excited to announce the release of its American National Standards Institute (ANSI)-approved standard designed to provide a framework for developing, implementing, maintaining, and improving school security. The first comprehensive standard of its kind provides a critical benchmark for assessing and improving a school’s security posture regardless of size and funding. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.