CyberSecurity


william barr

Attorney General Revives Feud With Tech Companies Over 'Warrant Proof' Encryption

Security experts and lawmakers say that creating a “backdoor” to unlock devices and messages would make those products vulnerable to hackers.



equifax logo

Equifax Will Pay At Least $650 Million In Settlement Over 2017 Data Breach

The credit-reporting agency will pay at least $300 million to victims. But it may be difficult for consumers to prove direct losses from identity theft.

healthcare working using tablet

Healthcare Industry at Highest Risk of Cybersecurity Breaches, Study Finds

While healthcare organizations are confidently moving sensitive patient data to the cloud, less than half are encrypting that information.

people using voting machines

Use of Aging Software on Voting Machines Raises Cybersecurity Concerns

Lawmakers are concerned about the use of out-of-date software on voting systems across the United States, but no new legislation has been passed in both chambers.

maryland capitol building

Sensitive Information of Over 1.4 Million Students 'Improperly Stored' by Maryland Government

A state audit found that the personal information of over 1 million students and more than 200,000 teachers was at risk of identity theft.

capitol hill

House Passes Two Bills Aimed at Improving Cybersecurity for Small Businesses

Both measures, which aim to improve the Small Business Administration and resources for business owners, were adopted with bipartisan support.

FTC’s $5 Billion Fine On Facebook Should Serve As ‘Warning’ For Companies Concerned About Data Security

FTC’s $5 Billion Fine On Facebook Should Serve As ‘Warning’ For Companies Concerned About Data Security

While the penalty will have little effect on Facebook’s bottom line, the massive fine could be indicative of the commission’s willingness to punish companies for data security issues.

Federal Election Commission

Cybersecurity Company Can Offer Discounted Services to Campaigns, FEC Rules

A California-based company has been given the OK to offer its services to campaigns for a discounted rate ⁠— as long as that rate is the same for other clients.

Committee on small business sign

Senators Introduce Bill to Help Small Businesses Improve Cybersecurity Protections

The legislation would require the Department of Homeland Security to develop educational resources for business owners and train counselors on higher-level cybersecurity information.

Employees Still Struggle to Identify Phishing Threats and Properly Protect Their Data, Report Finds

Respondents, who answered 22 percent of questions incorrectly, struggled most with assessments about mobile device encryption and protections for personally identifiable information.

Zoom headquarters

Flaw in Video Conferencing App Could Have Given Hackers Immediate Access to Webcam Feeds

The company, Zoom, is now taking action to update its software after a security researcher discovered several serious security vulnerabilities in the popular video chat app.

Two people using computer in office space

Five Ways to Keep Your Workplace Safe Online

Regardless of size or business type, companies must institute these basic practices to make sure their organizations are well protected from cybercriminals.

Map of Delaware

Ten Percent of Delaware Population Affected by Nearly Nine-Year Security Breach at Insurance Provider

Dominion National discovered in April that its servers, containing the financial and personal data of 95,000 Delawareans, may have been accessed by an unauthorized party since 2010.

georgia county courthouse

Georgia Court System Goes Offline After Ransomware Attack

The attack, which was discovered Monday, comes shortly after two Florida cities agreed to pay ransoms in order to recover their computer systems from hackers.

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Researchers have found over 2,000 apps that are potentially counterfeits, modeled after popular app downloads. These counterfeits contain harmful malware that could harm unsuspecting users.

Lake City to Pay Nearly $500,000 to Hackers

Lake City to Pay Nearly $500,000 to Hackers

Hackers have found a sweet spot in encrypting and attacking municipal computer systems. Lake City is the latest to suffer from these attacks, and after two weeks of inaccessible services, have agreed to pay the $460,000 ransom to hackers.

Experts Weigh In On New Cryptocurrency-Mining Botnet

Experts Weigh In On New Cryptocurrency Mining Botnet

A new cryptocurrency-mining botnet could severely affect unprotected Android users. Experts say while the unprotected devices are mostly phones in Asia, these issues are becoming a big problem for technology security.

WeTransfer Incident Shares Transferred Files with Unintended Users

WeTransfer Incident Shares Transferred Files with Unintended Users

WeTransfer files were transferred to unintended users on June 16 and 17. The scope of the incident is not clear, but the company promptly logged out affected accounts and disabled the transfer links.

Huawei Confident It Will Meet German 5G Standards

Huawei Confident It Will Meet German 5G Standards

Germany has decided to level the playing field and offer all foreign companies fair and equal chances to build the national 5G infrastructure. Huawei has responded, claiming that despite the warnings of the United States, they will be able to comply and meet these standards.

IoT Cybersecurity Bill Advances to Full Senate

IoT Cybersecurity Bill Advances to Full Senate

The IoT Cybersecurity bill, which was introduced in March, passed through the Senate Homeland Security and Governmental Affairs last week and is now headed to the full Senate for a vote.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3