CyberSecurity


Bring on the Power - Understanding that PoE impacts network design

Bring on the Power

When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.



WiFi-connected Toys May Stalk Children

WiFi-connected Toys May Stalk Children

Just how safe will the "Internet of Toys" be for your children?

Property Crime Down

If cyber crime and identity theft isn't taken into consideration.

Google Removes ‘How Can I Join ISIS’ Autosuggestion

Google Removes 'How Can I Join ISIS' Autosuggestion

The search phrase was giving people advice for joining the radical group.

Report Claims U.S. Embedded Spyware Overseas

Report Claims U.S. Embedded Spyware Overseas

The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.

Intercede's MyTAM Enables Enhanced Trust for Android Apps

Cloud-based service loads applications into the cryptographically-secured Trusted Execution Environment, embedded in the majority of leading Android smartphones.

Billion Dollar Cyberheist Caused By Phish-prone Employees

KnowBe4 urges US institutions to take effective action to train employees before they fall victim to phishing attacks.

Obama Recruiting Tech Companies for Cybersecurity

Obama Recruiting Tech Companies for Cybersecurity

Executive actions aim to increase information sharing among private sector companies and federal law enforcement.

Samsung SmartTVs May Record Conversations

Samsung SmartTVs May Record Conversations

A line in the privacy policy states the television may record conversation and send it to a third party.

New Report Finds Security Gaps in Vehicle Technology

New Report Finds Security Gaps in Vehicle Technology

A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.

Obama’s Security Strategy Features Robust Leadership, Limitations

Obama’s Security Strategy Features Robust Leadership, Limitations

The President’s second, and final, national security strategy focuses on limiting how much the United States can shape world events.

Anthem Blue Cross Hacked, Affecting Millions

Anthem Blue Cross Hacked, Affecting Millions

The health insurance company is working with the FBI to come to a solution.

Google Adds Two New Initiatives to Security Rewards Programs

Google Adds Two New Initiatives to Security Rewards Programs

Paid out more than $1.5 million in 2014.

BMW Fixes Security Flaw to Stop Hackers

BMW Fixes Security Flaw to Stop Hackers

The flaw could have potentially allowed hackers to open car doors.

Taking the Mystery Out of Video-in-the-Cloud - Why cloud storage is gaining popular support

Taking the Mystery Out of Video-in-the-Cloud

In a recent Hollywood comedy, Jason Segel’s character uttered the famous line, “Nobody understands the cloud. It’s a mystery.” And yet, all of us have been using the cloud for years: for online banking, online shopping, social media, email, sharing family photos and a host of other activities.

Firewall Protection - Vital information among the most coveted resources

Firewall Protection

Money Movers Inc. is a fully PCI DSS compliant Electronic Funds Transfer Gateway processor. In plain English, that means we move a lot of data over a network.

Recalibrating the Market - Step back and look at the entire solution

Recalibrating the Market

The network-based physical security industry has matured rapidly over the past few years. As the technology and other components of security solutions have advanced, so too have the customer’s expectations.

Hacker Startles Nanny via Baby Monitor with Camera

Hacker Startles Nanny via Baby Monitor with Camera

Three strategies to keep you and your children safe from the prying eyes and ears of hackers.

Child Predator Phishing Scam Preys On Parents' Fears

Scam sinks to new lows by targeting parents with fake “child predator in your area” emails.

Two Big Problems with Fingerprint Security

Two Big Problems with Fingerprint Security

One tech expert says biometrics are good, but there are still problems to consider.

Featured

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3