Data Security


City Recovers Slowly Following Ransomeware Attack

City Recovers Slowly Following Ransomeware Attack

Baltimore has been inching closer to restoring computer systems after a ransomeware attack on May 7.

Six Top Information Security Risks to Be Aware of in 2019

Six Top Information Security Risks to Be Aware of in 2019

While companies and individuals embrace innovation, cybercriminals make use of the new backdoors to improve the scope of their hacking.

Moving from DevOps to DevSecOps: The Path to Security

Moving from DevOps to DevSecOps: The Path to Security

Security is now being analyzed during the development process to account for every variable.

Google Replaces Titan Security Keys Due to Vulnerability

Google Replaces Titan Security Keys Due to Vulnerability

Google announced its Bluetooth security keys could be vulnerable to attack.

WhatsApp Discovers Major Security Loophole

WhatsApp Discovers Major Security Loophole

Here's what you need to know about WhatsApp's major security flaw.

Location Data of Some Twitter Users Leaked

Location Data of Some Twitter Users Leaked

A bug in the iOS Twitter app impacted the privacy of its users.

Crypto Exchange Service to Revamp Security Measures Following Hack

Crypto Exchange Service to Revamp Security Measures Following Hack

Binance is making significant security changes after 7,000 Bitcoins were stolen.

Photo Storage App Reportedly Used Customers

Photo Storage App Reportedly Used Customers' Images to Train a Facial Recognition System

Ever, a photo storage and backup app, reportedly trained a commercial facial recognition system using millions of images uploaded to the service without notifying users.



Technology Companies’ Role in the Adoption of Total Cyber Protection for SMBs

Technology Companies’ Role in the Adoption of Total Cyber Protection for SMBs

Technology is providing small and medium-sized businesses (SMBs) of all industries a tremendous opportunity to grow and better manage their business.

Android Q Will Focus on Security and Privacy, Google Says

Android Q Will Focus on Security and Privacy, Google Says

The tenth version of Android will include finer control over privacy and improvements to Android security updates, Google announced Tuesday at its I/O 2019 event

Can Your Business Survive Being Hacked?

Can Your Business Survive Being Hacked?

Find out how you should respond to being hacked.

U.K. Reveals New Law to Improve IoT Security

U.K. Reveals New Law to Improve IoT Security

The U.K. government is looking to step up IoT security against cybercriminals.

Five Biggest Security Myths Busted

Five Biggest Security Myths Busted

There are a number of common misconceptions about endpoint security.

Reasons to Implement a Zero Trust Security Model

Reasons to Implement a Zero Trust Security Model

Six reasons companies should implement a Zero Trust Security Mode.

Security at Scale—With Great Success Often Comes Great Security Problems

Security at Scale—With Great Success Often Comes Great Security Problems

Some common areas and issues to keep growing your business, not your security risk.

GDPR

GDPR's Impact on Incident Response

Beyond user privacy, we’ve seen GDPR impact companies in other ways.

Physician-Staffing Company Data Breach Exposes Personal Data for About 31,000 Patients

Physician-Staffing Company Data Breach Exposes Personal Info of About 31,000 Patients

EmCare Inc., a physician-staffing company, says a data breach has exposed personal information for about 31,000 patients

How to Stay Safe on Public Wi-Fi Networks: A Detailed Guide

How to Stay Safe on Public Wi-Fi Networks: A Detailed Guide

All of your personal data can be easily accessible and vulnerable to hackers.

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Hospitals are often in the news due to data breaches, and email hacks are often the cause.

How to Execute a SOC 2 Report — From Planning to Distribution

How to Execute a SOC 2 Report — From Planning to Distribution

Many companies are employing System and Organization Controls reports before procuring vendors' services.

Featured

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3