CyberSecurity


Types of Passwords Hackers Use for Their Own Accounts

Types of Passwords Hackers Use for Their Own Accounts

Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?



Privacy Concerns about Student Data Meets Big Parents

Privacy Concerns about Student Data Meets Big Parents

Parents of school children are standing up against Big Data when it comes to their children's personal information.

How Safe are Your Secrets Online?

How Safe are Your Secrets Online?

Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.

China to Punish Google, Apple and Microsoft for Spying

China to Punish Google, Apple and Microsoft for Spying

China's People's Daily, a state-operated media outlet, promises punishments as translated by Reuters.

Scan Wallpaper to Download Ebooks

Scan Wallpaper to Download Ebooks

Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.

Chinese Military Hackers Charged with Espionage

Charges flied in Pennsylvania, marking the first time criminal charges have been filed against known state actors for hacking.

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.

California Strides toward Internet User

California Strides toward Internet User's Privacy with New Law

Long-winded privacy policies create confusion and frustration for Internet consumers.

Massive Cyberattack Steals eBay Data

Massive Cyberattack Steals eBay Data

eBay officials urging all 112 million users to change their passwords immediately to help rectify recently-discovered breach.

Over 100 International Creepware Hackers Brought Down

Over 100 International Creepware Hackers Brought Down

Law enforcement officials from around the globe ban together in hopes of at least putting a dent into this global threat.

App Review: MamaBear App Increases Communication, Leading to Enhanced Safety

App Review: MamaBear App Increases Communication, Leading to Enhanced Safety

Engaging on Twitter leads to discover of app to help parents keep their children safe via open communication and allowing the child to be an advocate for their own safety.

ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.

I’m Sold on Biometrics

ISC West is a premier venue for technology and what’s new in the industry. Three products stand out in my mind. The first is a consumer product from FLIR that was introduced during the Consumer Electronics Show in January.

KS Mobile Announces New CM Security Heartbleed Scanner App

KS Mobile Announces New CM Security Heartbleed Scanner App

Heartbleed scanner identifies over 1,700 vulnerable mobile apps.

Eileen Turner serves as the Product Manager for the web fraud portfolio of Trusteer, an IBM Company, part of IBM’s Security Systems division.

When Online Fraud Targets You

When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.

Leo McGuire Honored with ESGR Spirit of Volunteerism Award

"We are extremely proud of Leo and the incredible amount of time and effort he provides in support of our service men and women. His devotion to helping them transition from military life to professional civilian careers exemplifies our recognition of American freedoms and opportunities," said Daniel Krantz, CEO of Real-Time Technology Group.

Yishay Yovel directs IBM Security

The Return of the Wild West: Securing Enterprise Mobile Applications Against Evolving Threats

To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.

Spring Cleaning Tips for Your Digital Security

Spring Cleaning Tips for Your Digital Security

Protect your digital life with this checklist of must-do security tasks.

R.I.P. Password

R.I.P. Password

A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone.

Solink Introduces Contextual Analytics to Help Customers use Video to See Big Data

Unique, event-based video discover platform coming to ISC West 2014.

Facebook Cracks Down on Gun Posts with New Regulations

Facebook Cracks Down on Gun Posts with New Regulations

Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3