CyberSecurity


Solution to Keep the US Government from Snooping

Solution to Keep the US Government from Snooping

Solutions that generate crypto keys may be the answer.



5 Things to Do Before 8AM to Protect Yourself Online

5 Things to Do Before 8AM to Protect Yourself Online

Grab your cup of coffee, and take 5 minutes to make sure you stay safe online!

Putting PIV Cards to Practical Use

Putting PIV Cards to Practical Use

The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount.

HID Global and Consortium Partners Receive US Cyber Security Grant

HID Global and Consortium Partners Receive US Cyber Security Grant

Grant valued at more than $1.5 million is one of four being awarded this year through the National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative.

Best Practices for Companies to Maintain Control of Sensitive Data

Best Practices for Companies to Maintain Control of Sensitive Data

A world saturated with digital data needs assurance that this data won't fall into the wrong hands.

Top 3 Internet Security Myths

Top 3 Internet Security Myths

Methodical approach and identifying the right tools to meet individual needs is key to security against cyber threats.

Clicking Through the Cloudy Relationship Between US Feds and Google

Clicking Through the Cloudy Relationship Between US Feds and Google

Data from Google scanning can be used for more than just targeting advertising, though what Google might be doing with private information is currently under seal.

Cyber Security Threats Part of ATTs New Launch

Cyber Security Threats Part of ATTs New Launch

Launching expanded set of managed security solutions, new capabilities and the expanding of their cyber security portfolio.

Iran Adds Hacking to Their High School Curriculum

Iran Adds Hacking to Their High School Curriculum

Should a school's curriculum include teaching students how to hack computers?

Featured

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

  • Human Risk Management: A Silver Bullet for Effective Security Awareness Training

    You would think in a world where cybersecurity breaches are frequently in the news, that it wouldn’t require much to convince CEOs and C-suite leaders of the value and importance of security awareness training (SAT). Unfortunately, that’s not always the case. Read Now

  • Windsor Port Authority Strengthens U.S.-Canada Border Waterway Safety, Security

    Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.