CyberSecurity


Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)



Meetup.com Deals with First Extortion Attempt Ever

Meetup.com Deals with First Extortion Attempt Ever

Why every company, no matter how big or small, needs to have an emergency response plan in place specifically for cyber attacks.

The Evolution of Identity Management: What to Expect

The Evolution of Identity Management: What to Expect

Cyber criminals are getting smarter about manipulating, stealing and profiting off of others’ identities.

Apple Encryption Flaw Leaves Data Vulnerable to Hackers

Apple Encryption Flaw Leaves Data Vulnerable to Hackers

Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.

ITIC and KnowBe4 Latest Study Reveals Companies Lack BYOD Security

ITIC and KnowBe4 Latest Study Reveals Companies Lack BYOD Security

New ITIC/KnowBe4 Independent Survey Reveals 53% of businesses are unprepared to deal with hacked or stolen BYOD devices even though 50% indicated company-owned tablets, notebooks & smart phones may have been hacked in last 12 months.

Bitcoin ATMs Launching This Month in the US

Bitcoin ATMs Launching This Month in the US

Is your city one of the first in America to host a Bitcoin ATM?

New Cybersecurity Guidelines Released by White House, Part 2

New Cybersecurity Guidelines Released by White House, Part 2

“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama

New Cybersecurity Guidelines Released by White House, Part 1

New Cybersecurity Guidelines Released by White House, Part 1

“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama.

Cyber Security Insurance

People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.

Your Vendors: Cold Beer or Malicious Attack Vector?

Your Vendors: Cold Beer or Malicious Attack Vector?

The five golden rules of developing a strong network security strategy for managing vendor access.

Increasing Security with Smart Credentials

Increasing Security with Smart Credentials

For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.

Making the Choice - Fixed costs, customized solutions and user convenience - determining factors in buying physical identity and access management

Making the Choice

The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.

Stolen Vendor Credentials Responsible for Target Breach

Stolen Vendor Credentials Responsible for Target Breach

A strategy for the successful management of vendor remote access.

$9.84 Credit Charge on Statement Could Indicate Fraud

$9.84 Credit Charge on Statement Could Indicate Fraud

What to do if your statement has a charge of $9.84 followed by an unfamiliar website URL.

Michael’s Arts and Crafts Store Dealing with Possible Data Breach

Michael’s Arts and Crafts Store Dealing with Possible Data Breach

Things you need to do NOW if you have recently shopped at this arts and crafts store.

Google Chrome Hack Allows Websites to Listen to You

Google Chrome Hack Allows Websites to Listen to You

Even after closing a tab, pop-up window has the ability to record your voice, almost indefinitely, without you even knowing.

4 Easy-to-Do Tips to Defend Against the Target Hacks

4 Easy-to-Do Tips to Defend Against the Target Hacks

Hey Target shoppers! Here's your special of the day to keep your shopping experience at Target out of the hands of the "bad guys."

Target Hack Affected 70 Million Customers

Target Hack Affected 70 Million Customers

As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.

Top 10 Articles of 2013 on Security Today

Most-read articles of 2103 are about airport security, iPhones, social media, guns, TSA, Android and Homeland Security.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3