The Obama administration a breach on government workers could affect up to four million citizens.
- By Matt Holden
- Jun 05, 2015
Company provides security features and tools to empower individual account users.
- By Ginger Hill
- May 27, 2015
IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.
Tallying the number of alerts and breaches doesn't tell the whole story.
- By Ginger Hill
- May 26, 2015
A new research paper found that people often choose obvious answers that are easy for hackers to guess.
- By Matt Holden
- May 22, 2015
The airline will pay a maximum of one million miles to anyone who can prove a remote code execution.
- By Matt Holden
- May 15, 2015
Absolute Software report uncovers usage behavior and security risks of connected employees.
MyID technology allows customers to sign and encrypt email from mobile devices securely using WorxMail.
Users who have auto-reload setup on their digital card might be vulnerable.
- By Matt Holden
- May 13, 2015
The hotel & casino says hackers may have access to information about credit and debit cards.
- By Matt Holden
- May 05, 2015
Hopefully, hackers have heart not to launch nuclear weapons.
The changes would be made to confront new security risks in many different areas.
- By Matt Holden
- Apr 28, 2015
The 2015 edition of the DBIR provides insight into the state of cyber-security in 2014.
- By Matt Holden
- Apr 22, 2015
With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.
- By Cale Dowell
- Apr 10, 2015
An official has stated that unclassified computers at the White House are vulnerable.
- By Matt Holden
- Apr 08, 2015
Convergence of physical and cybersecurity along with information management solutions.
A cybersecurity activist developed the roster, but it has flaws.
- By Matt Holden
- Apr 01, 2015
Highly malicious strain found only takes 1 click to infect systems using DropBox.
Per Björkdahl shares his thoughts about cybersecurity, the IP video market, access control and interoperability.
Machines learning to recognize objects with accuracy, but can also be fooled by optical illusions.
- By Ginger Hill
- Mar 25, 2015