CyberSecurity


Utah System of Higher Education Requests $2 Million for Security

Utah System of Higher Education Requests $2 Million for Security

Higher education leaders are asking the state for more money to help protect universities from IT security threats.



Scammers Taking Advantage of Apple Pay

Scammers Taking Advantage of Apple Pay

Criminals are using the platform to buy goods with stolen identities and credit cards

Bring on the Power - Understanding that PoE impacts network design

Bring on the Power

When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.

WiFi-connected Toys May Stalk Children

WiFi-connected Toys May Stalk Children

Just how safe will the "Internet of Toys" be for your children?

Property Crime Down

If cyber crime and identity theft isn't taken into consideration.

Google Removes ‘How Can I Join ISIS’ Autosuggestion

Google Removes 'How Can I Join ISIS' Autosuggestion

The search phrase was giving people advice for joining the radical group.

Report Claims U.S. Embedded Spyware Overseas

Report Claims U.S. Embedded Spyware Overseas

The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.

Intercede's MyTAM Enables Enhanced Trust for Android Apps

Cloud-based service loads applications into the cryptographically-secured Trusted Execution Environment, embedded in the majority of leading Android smartphones.

Billion Dollar Cyberheist Caused By Phish-prone Employees

KnowBe4 urges US institutions to take effective action to train employees before they fall victim to phishing attacks.

Obama Recruiting Tech Companies for Cybersecurity

Obama Recruiting Tech Companies for Cybersecurity

Executive actions aim to increase information sharing among private sector companies and federal law enforcement.

Samsung SmartTVs May Record Conversations

Samsung SmartTVs May Record Conversations

A line in the privacy policy states the television may record conversation and send it to a third party.

New Report Finds Security Gaps in Vehicle Technology

New Report Finds Security Gaps in Vehicle Technology

A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.

Obama’s Security Strategy Features Robust Leadership, Limitations

Obama’s Security Strategy Features Robust Leadership, Limitations

The President’s second, and final, national security strategy focuses on limiting how much the United States can shape world events.

Anthem Blue Cross Hacked, Affecting Millions

Anthem Blue Cross Hacked, Affecting Millions

The health insurance company is working with the FBI to come to a solution.

Google Adds Two New Initiatives to Security Rewards Programs

Google Adds Two New Initiatives to Security Rewards Programs

Paid out more than $1.5 million in 2014.

BMW Fixes Security Flaw to Stop Hackers

BMW Fixes Security Flaw to Stop Hackers

The flaw could have potentially allowed hackers to open car doors.

Firewall Protection - Vital information among the most coveted resources

Firewall Protection

Money Movers Inc. is a fully PCI DSS compliant Electronic Funds Transfer Gateway processor. In plain English, that means we move a lot of data over a network.

Taking the Mystery Out of Video-in-the-Cloud - Why cloud storage is gaining popular support

Taking the Mystery Out of Video-in-the-Cloud

In a recent Hollywood comedy, Jason Segel’s character uttered the famous line, “Nobody understands the cloud. It’s a mystery.” And yet, all of us have been using the cloud for years: for online banking, online shopping, social media, email, sharing family photos and a host of other activities.

Recalibrating the Market - Step back and look at the entire solution

Recalibrating the Market

The network-based physical security industry has matured rapidly over the past few years. As the technology and other components of security solutions have advanced, so too have the customer’s expectations.

Hacker Startles Nanny via Baby Monitor with Camera

Hacker Startles Nanny via Baby Monitor with Camera

Three strategies to keep you and your children safe from the prying eyes and ears of hackers.

Featured

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.