Data Security


Facebook Announces Plans to Pivot toward Privacy

Facebook Announces Plans to Pivot toward Privacy

“I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won't stick around forever. This is the future I hope we will help bring about,” Zuckerberg wrote.

Verizon Report Explores the World of Insider Threats

Verizon Report Explores the World of Insider Threats

Verizon takes its Data Breach Investigations Report and refocuses on Insider Threat reports.

Facebook Accused of Misusing the Phone Numbers

Facebook Accused of Misusing Phone Numbers

Facebook users have found that a phone number they added to their account for the sole purpose of two-factor authentication can be used to look up their account by advertisers and strangers.

IBM Finds Security Flaws in Visitor Check-In Systems

IBM Finds Security Flaws in Visitor Check-In Systems

“We found that you could break out of the kiosk and interact with the underlying Windows operating systems, and from there do things like drop malware or open up the database,” said Daniel Crowder, research director at the IBM X-Force Red security unit.

Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

What can you do to protect your personal data in 2019?

TikTok Hit with Record Setting Fine for Collecting Data of Children

TikTok Hit with Record Setting Fine for Collecting Data of Children

TikTok, a popular video-sharing app, has agreed to pay $5.7 million to settle allegations that it collected data on children.

Secure Storage in the Age of Edge Computing and the Cloud

Secure Storage in the Age of Edge Computing and the Cloud

Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.

Looking Beyond the Hype

Looking Beyond the Hype

The past few years have seen significant advancements in computing power. With this, machines seem to have a greater ability to learn about us and participate in our lives.



The Year of the Cloud

People are always trying to predict industry trends, but virtually all of the predicted trends I have read lately are just a subset of the benefits offered by cloud managed video.

Are You Throwing Money Away

Are You Throwing Money Away

Millions of video surveillance cameras around the world are losing money.

Security Flaws Already Found in 5G Technology

Security Flaws Already Found in 5G Technology

5G is the talk of the town, but is it free of security risks?

Military File-Sharing Site Brought Back Online Following Security Concerns

Military File-Sharing Site Brought Back Online Following Security Concerns

The Defense Department website used to transfer large files containing sensitive unclassified information was brought back online earlier this month after being taken down due to security concerns last year.

New Report Shows 550 Percent Increase in Consumer Security Risks Connected to Apps

New Report Shows 550 Percent Increase in Consumer Security Risks Connected to Apps

McAfee's Mobile Threat Report found that reporting backdoors, malicious cryptomining, fake apps and banking Trojans all increased substantially in 2018.

Reverse Engineering is One of Your Best Weapons in the Fight Against Cyberattacks

Reverse Engineering is One of Your Best Weapons in the Fight Against Cyberattacks

Reverse engineering is a powerful tool to keep in your cybersecurity tool belt.

California Introduces New Bill to Enhance Data Breach Notification Laws

California Introduces New Bill to Enhance Data Breach Notification Laws

California already has some of the strongest data breach laws in the U.S., but thinks it can do better.

Senate Intelligence Committee Questions Healthcare Cybersecurity

Senate Intelligence Committee Questions Healthcare Cybersecurity

Democrat Senator Mark Warner is asking healthcare organizations how the Senate Intelligence Committee can aid in beefing up cybersecurity laws.

Major Security Flaws Found in Popular Password Managers

Major Security Flaws Found in Popular Password Managers

Independent Security Evaluators found some worrying flaws in popular password managers, but still suggest that you use one.

Nearly 50,000 AdventHealth Patients Impacted in Yearlong Data Breach

Nearly 50,000 AdventHealth Patients Impacted in Yearlong Data Breach

AdventHealth's system was breached for over a year, impacting 42,000 patients and their data.

Identity In A Zero Trust World

Identity In A Zero Trust World

Our solutions must continually validate the identity of the person accessing our applications and data.

Nearly 15 Million 500px Users Made Vulnerable by Breach

Nearly 15 Million 500px Users Made Vulnerable by Breach

The names, usernames, passwords and other sensitive information was leaked in July of 2018.

Featured

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3