CyberSecurity


cloud computing

Leverage the Cloud for Event Security

Technology advances have made security and access management more efficient.



department of homeland security flag

DHS Warns of Iran’s Potential To Retaliate With Cyber Attacks, Terrorist Acts After Soleimani Killing

The department warned in an alert that Iran has a “robust cyber program” and can carry out attacks to temporarily disrupt critical infrastructure.

ring doorbell camera

Ring Responds to Hacking Reports With New Privacy Options In Mobile App

The company has faced complaints, and a lawsuit, from customers that hackers were able to take over accounts and speak to children through the doorbell camera’s speaker.

2020 logo

A New Decade Means A New Frontier in Technology and Security

Can we imagine a new decade in which we protect our privacy and security while still maintaining innovation and freedom online?

facial recognition system

Majority of Facial Recognition Systems Are Less Accurate For People of Color, Federal Study Finds

Native Americans had the highest rates of false positives, while African-American women were most likely to be misidentified in a law enforcement database.

ring doorbell camera

Ring Faces Intense Scrutiny After Reports That Thousands of Users’ Information Was Leaked Online

The security camera company owned by Amazon says that there was not a breach of its servers and blame the issue on lax cybersecurity practices by users.

child smart watch

Millions of Children-Tracking Smartwatches Are At Risk Of Being Hacked

New findings by security firm Pen Test Partners reveal that 47 million devices worldwide could be exposed and tracked thanks to a strikingly insecure cloud platform.

dark twitter screen

Hackers Targeted Epilepsy Foundation With Strobe Lights Aiming to Induce Seizures

The foundation has reported at least 30 incidents that targeted their Twitter account and followers last month with GIFs and videos of harmful strobe lights.

christmas shopping

Don’t Let ‘Christmas Phishing’ Ruin Your Holiday Season

As shoppers try to find deals in time to put presents under the tree, phishing campaigns are making it more difficult for consumers to tell if a website is naughty or nice.

orbitz site

Orbitz and Expedia Reach $110,000 Settlement with Pennsylvania AG Over 2017 Data Breach

The travel companies were fined for lax data security practices that potentially led to a breach affecting 880,000 payment cards globally.

New Orleans Becomes Latest City To Suffer Ransomware Attack

The cyberattack caused the city to completely shut down its network for several days, but did not affect emergency services.

Lindsey Graham

Senators to Big Tech Companies: Build A Back Door For Law Enforcement To Access Encrypted Messages, Or Else

The ongoing debate over Apple and Facebook’s decision to not build “backdoors” for law enforcement to obtain encrypted messages continued to rage during a Senate hearing on Tuesday.

cyber attack

Pensacola Government Faces Cyber Attack Hours After Shooting at Naval Base

The government has not linked the attack to the shooting, which is being investigated as an act of terrorism.

Huawei Files Second Lawsuit Against U.S. Government Over Ban

After the FCC voted to ban telecommunications companies from using subsidies to buy equipment from Huawei, the Chinese company filed suit.

Spotting Signs Your IT is Out of Date

This evolution not only keeps the IT department in a constant state of change, but also dramatically changes the way the overall business must adapt to stay competitive.

Looking to the Future

Looking to the Future

Video surveillance technologies continue to evolve. Some of the fastest-growing areas include AI-based video analytics and cloudbased video access and recording.

Taking on Security Automation

Taking on Security Automation

Not only does modern software architecture create a broader attack surface area, the accelerated DevOps methodology makes it harder to detect and remediate vulnerabilities.

Thanksigiving Dinner

This Thanksgiving, Be Thankful For Steps You Can Take to Protect Your Privacy

The debate is raging over whether privacy is dead. But data security and privacy is what you make of it.

nursing home

More Than 100 Nursing Homes Cut Off From Health Data, Payroll Due to Ransomware Attack

A cyber attack on an IT services provider has had major consequences for nursing homes, some of which may have to close down if they do not gain access to crucial patient data.

huawei

Senators Call For Commerce Department To Stop Licensing Tech Sales to Huawei

Huawei has started granting licenses to companies, including Microsoft, hoping to sell products to the Chinese tech giant.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3