CyberSecurity


The 12 Days of Security Tips

The 12 Days of Security Tips

Over the next 12 days, check back for updated safety and security tips, clever lyrics and holiday fun with Security Today as we explore the 12 Days of Christmas...security style!



Playstation 4 Security Tips for Safe Gaming

Playstation 4 Security Tips for Safe Gaming

Helping you and your family stay safe while enjoying your Playstation 4 gaming journey.

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

What you can do to help prevent your social media login credentials from getting stolen.

More than a byte

More than a Byte

Cybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks.

Accelerating Detection and Response

Last spring, in late March, regional grocer Schnucks Markets reported that the credit card data of more than 2 million customers was stolen by cybercriminals.

On The Fast Track

On the Fast Track

Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.

kolbye thumbnail

FBI Special Agent Discusses Counterterrorism at GovSec West 2013

Kevin Kolbye, as assistant special agent in charge of the FBI’s Dallas office, spoke about the FBI’s counterterrorism efforts.

Solution to Keep the US Government from Snooping

Solution to Keep the US Government from Snooping

Solutions that generate crypto keys may be the answer.

5 Things to Do Before 8AM to Protect Yourself Online

5 Things to Do Before 8AM to Protect Yourself Online

Grab your cup of coffee, and take 5 minutes to make sure you stay safe online!

Putting PIV Cards to Practical Use

Putting PIV Cards to Practical Use

The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount.

HID Global and Consortium Partners Receive US Cyber Security Grant

HID Global and Consortium Partners Receive US Cyber Security Grant

Grant valued at more than $1.5 million is one of four being awarded this year through the National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative.

Best Practices for Companies to Maintain Control of Sensitive Data

Best Practices for Companies to Maintain Control of Sensitive Data

A world saturated with digital data needs assurance that this data won't fall into the wrong hands.

Top 3 Internet Security Myths

Top 3 Internet Security Myths

Methodical approach and identifying the right tools to meet individual needs is key to security against cyber threats.

Clicking Through the Cloudy Relationship Between US Feds and Google

Clicking Through the Cloudy Relationship Between US Feds and Google

Data from Google scanning can be used for more than just targeting advertising, though what Google might be doing with private information is currently under seal.

Cyber Security Threats Part of ATTs New Launch

Cyber Security Threats Part of ATTs New Launch

Launching expanded set of managed security solutions, new capabilities and the expanding of their cyber security portfolio.

Iran Adds Hacking to Their High School Curriculum

Iran Adds Hacking to Their High School Curriculum

Should a school's curriculum include teaching students how to hack computers?

Featured

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.