CyberSecurity


fbi seal

FBI Warns U.S. Companies About Recent Scourge of “Maze” Ransomware Attacks

The advisory warned businesses about cyber attacks featuring cryptocurrency sites and spam campaigns impersonating government agencies.



cloud computing

Leverage the Cloud for Event Security

Technology advances have made security and access management more efficient.

department of homeland security flag

DHS Warns of Iran’s Potential To Retaliate With Cyber Attacks, Terrorist Acts After Soleimani Killing

The department warned in an alert that Iran has a “robust cyber program” and can carry out attacks to temporarily disrupt critical infrastructure.

ring doorbell camera

Ring Responds to Hacking Reports With New Privacy Options In Mobile App

The company has faced complaints, and a lawsuit, from customers that hackers were able to take over accounts and speak to children through the doorbell camera’s speaker.

2020 logo

A New Decade Means A New Frontier in Technology and Security

Can we imagine a new decade in which we protect our privacy and security while still maintaining innovation and freedom online?

facial recognition system

Majority of Facial Recognition Systems Are Less Accurate For People of Color, Federal Study Finds

Native Americans had the highest rates of false positives, while African-American women were most likely to be misidentified in a law enforcement database.

ring doorbell camera

Ring Faces Intense Scrutiny After Reports That Thousands of Users’ Information Was Leaked Online

The security camera company owned by Amazon says that there was not a breach of its servers and blame the issue on lax cybersecurity practices by users.

child smart watch

Millions of Children-Tracking Smartwatches Are At Risk Of Being Hacked

New findings by security firm Pen Test Partners reveal that 47 million devices worldwide could be exposed and tracked thanks to a strikingly insecure cloud platform.

dark twitter screen

Hackers Targeted Epilepsy Foundation With Strobe Lights Aiming to Induce Seizures

The foundation has reported at least 30 incidents that targeted their Twitter account and followers last month with GIFs and videos of harmful strobe lights.

christmas shopping

Don’t Let ‘Christmas Phishing’ Ruin Your Holiday Season

As shoppers try to find deals in time to put presents under the tree, phishing campaigns are making it more difficult for consumers to tell if a website is naughty or nice.

orbitz site

Orbitz and Expedia Reach $110,000 Settlement with Pennsylvania AG Over 2017 Data Breach

The travel companies were fined for lax data security practices that potentially led to a breach affecting 880,000 payment cards globally.

New Orleans Becomes Latest City To Suffer Ransomware Attack

The cyberattack caused the city to completely shut down its network for several days, but did not affect emergency services.

Lindsey Graham

Senators to Big Tech Companies: Build A Back Door For Law Enforcement To Access Encrypted Messages, Or Else

The ongoing debate over Apple and Facebook’s decision to not build “backdoors” for law enforcement to obtain encrypted messages continued to rage during a Senate hearing on Tuesday.

cyber attack

Pensacola Government Faces Cyber Attack Hours After Shooting at Naval Base

The government has not linked the attack to the shooting, which is being investigated as an act of terrorism.

Huawei Files Second Lawsuit Against U.S. Government Over Ban

After the FCC voted to ban telecommunications companies from using subsidies to buy equipment from Huawei, the Chinese company filed suit.

Spotting Signs Your IT is Out of Date

This evolution not only keeps the IT department in a constant state of change, but also dramatically changes the way the overall business must adapt to stay competitive.

Looking to the Future

Looking to the Future

Video surveillance technologies continue to evolve. Some of the fastest-growing areas include AI-based video analytics and cloudbased video access and recording.

Taking on Security Automation

Taking on Security Automation

Not only does modern software architecture create a broader attack surface area, the accelerated DevOps methodology makes it harder to detect and remediate vulnerabilities.

Thanksigiving Dinner

This Thanksgiving, Be Thankful For Steps You Can Take to Protect Your Privacy

The debate is raging over whether privacy is dead. But data security and privacy is what you make of it.

nursing home

More Than 100 Nursing Homes Cut Off From Health Data, Payroll Due to Ransomware Attack

A cyber attack on an IT services provider has had major consequences for nursing homes, some of which may have to close down if they do not gain access to crucial patient data.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3