CyberSecurity


Apple Urges U.S. to Form Encryption Commission

Apple Urges U.S. to Form Encryption Commission

The company asked the government to create a panel to help resolve a standoff over national security.



Annual Assessment Outlines the Greatest Security Threats Facing the U.S.

Annual Assessment Outlines the Greatest Security Threats Facing the U.S.

Director of National Intelligence speaks about which security threats the United States should be prepared for.

Data Breach: 63,000 Social Security Numbers Compromised at University

Data Breach: 63,000 Social Security Numbers Compromised at University

The University of Central Florida is investigating a data breach that left 63,000 Social Security numbers vulnerable.

DropBox, Gmail Logins Acquired in Security Camera Hack

DropBox, Gmail Logins Acquired in Security Camera Hack

Researchers find the Motorola Focus 73 security camera to have a pretty big vulnerability.

Is your Bank Teller your Biggest Threat?

Is your Bank Teller your Biggest Threat?

Bank robbers aren’t the only ones that will demand cash from your accounts.

Facebook Bans Private Gun Sales on Its Site

Facebook Bans Private Gun Sales on Its Site

Facebook announces they will be banning private gun sales on its site, a move meant to clamp down on unlicensed gun transactions.

Where Video Data Will Take Us - Successful companies read the tea leaves and saw IoT-connected devices coming. This includes video surveillance, which is now among the fastest growing industries in terms of data generation and adoption of new data storage technologies.

Where Video Data Will Take Us

Successful companies read the tea leaves and saw IoT-connected devices coming. This includes video surveillance, which is now among the fastest growing industries in terms of data generation and adoption of new data storage technologies.

It

It's All About the Network

The daily increase in the number of cyber attacks launched and the success hackers are having against heavily guarded businesses are a wake-up call for all companies to be more proactive and vigilant in their security efforts.

Top Fraud Risks for Financial Institutions in 2016

5 Top Fraud Risks for Financial Institutions in 2016

All in all, cyberattacks will continue to menace financial institutions in 2016.

3 Strategies for Ensuring Your Payment Platforms Are Secure

Online Exclusive: 3 Strategies for Ensuring Your Payment Platforms Are Secure

Consumers may think data breaches are inevitable, but if a business can show them that such risks are avoidable, it’s sure to profit. Don’t get left behind by your competitors—invest in a robust payment-protection platform before it’s too late.

Hackers could be Secretly Tapping into your Corporate Meetings

Hackers could be Secretly Tapping into your Corporate Meetings

Lots of companies, even the White House, use a conference calling system that could possibly be tapped by hackers, according to new research.

Your Smartwatch Could Be your Biggest Security Threat

Your Smartwatch Could Be Your Biggest Security Threat

A student discovered that wearable technology could lead to stolen ATM pin codes.

Security Flaw Found in New “Must-Have” Star Wars Toy

Security Flaw Found in New “Must-Have” Star Wars Toy

A security research company has found easy it is to bring BB-8 to the dark side.

Websites and Apps Have One Year to Adhere to New Security Measures

Websites and apps have been given the deadline of January 1, 2017 to adhere to new security standards to minimize the risk of hacking and prevent a “mini-Y2K,” or have access to their websites taken away.

Worst Data Breaches of 2015

Worst Data Breaches of 2015

It seems all we read about in 2015 was data breaches, data breaches and more data breaches.

Target Wish List App Exposes Users’ Data to a Potential Breach

Target Wish List App Exposes Users' Data to a Potential Breach

Target is back on the naughty list after a tech security company found that users’ data could be pulled from a gift registry app.

Los Angeles Closes All District Schools after Bomb Threat

Los Angeles Closes All District Schools after Bomb Threat

All LAUSD schools were closed after an electronic threat risked the safety of students.

U.S. Looking to Boost Social Media Security

U.S. Looking to Boost Social Media Security

After evidence of attack in San Bernardino was found on social media, the U.S. Department of Homeland Security is looking to boost security on social-networking sites.

Potential Security Risk of Wearable Tech

Potential Security Risks of Wearable Tech

The new, trendy wearable technology could pose a security threat to you.

Patient Data Vulnerable in Hospital Cybersecurity Breach

Patient Data Vulnerable in Hospital Cybersecurity Breach

Middlesex Hospital suffered a data breach that compromised the information of over 900 patients.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3