CyberSecurity


KS Mobile Announces New CM Security Heartbleed Scanner App

KS Mobile Announces New CM Security Heartbleed Scanner App

Heartbleed scanner identifies over 1,700 vulnerable mobile apps.



Eileen Turner serves as the Product Manager for the web fraud portfolio of Trusteer, an IBM Company, part of IBM’s Security Systems division.

When Online Fraud Targets You

When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.

Leo McGuire Honored with ESGR Spirit of Volunteerism Award

"We are extremely proud of Leo and the incredible amount of time and effort he provides in support of our service men and women. His devotion to helping them transition from military life to professional civilian careers exemplifies our recognition of American freedoms and opportunities," said Daniel Krantz, CEO of Real-Time Technology Group.

Yishay Yovel directs IBM Security

The Return of the Wild West: Securing Enterprise Mobile Applications Against Evolving Threats

To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.

Spring Cleaning Tips for Your Digital Security

Spring Cleaning Tips for Your Digital Security

Protect your digital life with this checklist of must-do security tasks.

R.I.P. Password

R.I.P. Password

A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone.

Solink Introduces Contextual Analytics to Help Customers use Video to See Big Data

Unique, event-based video discover platform coming to ISC West 2014.

Facebook Cracks Down on Gun Posts with New Regulations

Facebook Cracks Down on Gun Posts with New Regulations

Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)

Meetup.com Deals with First Extortion Attempt Ever

Meetup.com Deals with First Extortion Attempt Ever

Why every company, no matter how big or small, needs to have an emergency response plan in place specifically for cyber attacks.

The Evolution of Identity Management: What to Expect

The Evolution of Identity Management: What to Expect

Cyber criminals are getting smarter about manipulating, stealing and profiting off of others’ identities.

Apple Encryption Flaw Leaves Data Vulnerable to Hackers

Apple Encryption Flaw Leaves Data Vulnerable to Hackers

Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.

ITIC and KnowBe4 Latest Study Reveals Companies Lack BYOD Security

ITIC and KnowBe4 Latest Study Reveals Companies Lack BYOD Security

New ITIC/KnowBe4 Independent Survey Reveals 53% of businesses are unprepared to deal with hacked or stolen BYOD devices even though 50% indicated company-owned tablets, notebooks & smart phones may have been hacked in last 12 months.

Bitcoin ATMs Launching This Month in the US

Bitcoin ATMs Launching This Month in the US

Is your city one of the first in America to host a Bitcoin ATM?

New Cybersecurity Guidelines Released by White House, Part 2

New Cybersecurity Guidelines Released by White House, Part 2

“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama

New Cybersecurity Guidelines Released by White House, Part 1

New Cybersecurity Guidelines Released by White House, Part 1

“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama.

Cyber Security Insurance

People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.

Your Vendors: Cold Beer or Malicious Attack Vector?

Your Vendors: Cold Beer or Malicious Attack Vector?

The five golden rules of developing a strong network security strategy for managing vendor access.

Increasing Security with Smart Credentials

Increasing Security with Smart Credentials

For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.

Making the Choice - Fixed costs, customized solutions and user convenience - determining factors in buying physical identity and access management

Making the Choice

The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3