CyberSecurity


Security Vulnerabilities Found in PC Support Software

Security Vulnerabilities Found in PC Support Software

Lenovo, Toshiba and Dell advise users to remove software due to security issues.



Security Breach at Toy Maker Exposes Data on Children

Security Breach at Toy Maker Exposes Data on Children

VTech has been hacked putting the personal information of millions of people, including children, at risk.

Automakers Push Back as Research Shows Car Hacking

Automakers Push Back as Research Shows Car Hacking

To automakers, they are building a world of safer cars, but to data security researchers, they are creating high velocity weapons.

Microsoft Revamps Security Plan

Microsoft Revamps Security Plan

Microsoft plans to invest in new security plan after several high-profile cyber attacks.

Hackers could be Targeting Your Smart TV

Hackers Could Be Targeting Your Smart TV

Avast researchers have found a number of vulnerabilities in Smart TVs.

Panaseer Raises $2.25 Million Seed Investment

Fast-growing cyber security software firm attracts new clients in UK and US.

This Key Industry is Way Behind on Data Security

This Key Industry is Way Behind on Data Security

Despite the growing cyber attacks, the health care industry continues to shortchange Americans when it comes to data security.

3 Charged in Largest-Ever U.S. Bank Data Breach

3 Charged in Largest-Ever U.S. Bank Data Breach

Federal authorities say three people have been charged in the largest theft of consumer data from a U.S. financial institution in history.

Dropbox Combats Security Stigma with Enterprise Version of App

Dropbox Combats Security Stigma with Enterprise Version of App

Dropbox creates Enterprise version of app to combat their reputation of being a low security file-sharing platform.

Taking a Practical Look at Video Storage in the Cloud

Taking a Practical Look at Video Storage in the Cloud

VSaaS solutions have been around for a while now, offering what many see as more efficient software maintenance and support for their surveillance systems.

Majority of Retailers are not using the New Credit Card Technology

Majority of Retailers are not using the New Credit Card Technology

Retailers are deciding not to change over to credit card chip transactions until after the holiday season.

With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.

7 Tips for CEOs Looking to Boost Their Cybersecurity Knowledge

With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.

Persistent Threats

A layered approach to network security is the most reliable way of ensuring peace of mind against Advanced Persistent Threat (APT) forms of cyberattacks because no modern company can afford the surefire method of protection

Protect Your Data - In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

Protect Your Data

In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

Study Shows Employees are Putting Their Companies at Risk

Study Shows Employees are Putting Their Companies at Risk

Poor security habits from employees could lead to a cybersecurity breach.

Cisco Joins with Lancope to Gain Greater Network Security

Cisco Joins with Lancope to Gain Greater Network Security

Cisco's acquisition of Lancope predicted to boost Cisco’s cybersecurity threat defense capabilities.

Why Tech’s Biggest Companies are Against the Cyber Security Bill

Why Tech's Biggest Companies are Against the Cyber Security Bill

Some of technologies leading revolutionaries disregard the Cyber Security Bill as a legitimate solution to the data breaches seen in recent news.

Three Security Questions to ask Cloud Vendors

Three Security Questions to ask Cloud Vendors

There are many concerns when transferring to the cloud and security is one of the biggest, followed closely by concerns about complying with regulations and losing control of data according to a recent study by 451 Research.

Global Mobile Networks are Vulnerable to Security Bugs

Global Mobile Networks are Vulnerable to Security Bugs

A new study shows how mobile networks around the world have been hacked via bugs in the code.

Chinese iPhone Users Targeted in Security Breach

Chinese iPhone Users Targeted in Security Breach

After an attack on the App Store, iPhone and iPad users in China and Taiwan are still at risk.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3