Data Security


Facebook Announces Plans to Pivot toward Privacy

Facebook Announces Plans to Pivot toward Privacy

“I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won't stick around forever. This is the future I hope we will help bring about,” Zuckerberg wrote.

Verizon Report Explores the World of Insider Threats

Verizon Report Explores the World of Insider Threats

Verizon takes its Data Breach Investigations Report and refocuses on Insider Threat reports.

Facebook Accused of Misusing the Phone Numbers

Facebook Accused of Misusing Phone Numbers

Facebook users have found that a phone number they added to their account for the sole purpose of two-factor authentication can be used to look up their account by advertisers and strangers.

IBM Finds Security Flaws in Visitor Check-In Systems

IBM Finds Security Flaws in Visitor Check-In Systems

“We found that you could break out of the kiosk and interact with the underlying Windows operating systems, and from there do things like drop malware or open up the database,” said Daniel Crowder, research director at the IBM X-Force Red security unit.

Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

What can you do to protect your personal data in 2019?

TikTok Hit with Record Setting Fine for Collecting Data of Children

TikTok Hit with Record Setting Fine for Collecting Data of Children

TikTok, a popular video-sharing app, has agreed to pay $5.7 million to settle allegations that it collected data on children.

Secure Storage in the Age of Edge Computing and the Cloud

Secure Storage in the Age of Edge Computing and the Cloud

Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.

Looking Beyond the Hype

Looking Beyond the Hype

The past few years have seen significant advancements in computing power. With this, machines seem to have a greater ability to learn about us and participate in our lives.



The Year of the Cloud

People are always trying to predict industry trends, but virtually all of the predicted trends I have read lately are just a subset of the benefits offered by cloud managed video.

Are You Throwing Money Away

Are You Throwing Money Away

Millions of video surveillance cameras around the world are losing money.

Security Flaws Already Found in 5G Technology

Security Flaws Already Found in 5G Technology

5G is the talk of the town, but is it free of security risks?

Military File-Sharing Site Brought Back Online Following Security Concerns

Military File-Sharing Site Brought Back Online Following Security Concerns

The Defense Department website used to transfer large files containing sensitive unclassified information was brought back online earlier this month after being taken down due to security concerns last year.

New Report Shows 550 Percent Increase in Consumer Security Risks Connected to Apps

New Report Shows 550 Percent Increase in Consumer Security Risks Connected to Apps

McAfee's Mobile Threat Report found that reporting backdoors, malicious cryptomining, fake apps and banking Trojans all increased substantially in 2018.

Reverse Engineering is One of Your Best Weapons in the Fight Against Cyberattacks

Reverse Engineering is One of Your Best Weapons in the Fight Against Cyberattacks

Reverse engineering is a powerful tool to keep in your cybersecurity tool belt.

California Introduces New Bill to Enhance Data Breach Notification Laws

California Introduces New Bill to Enhance Data Breach Notification Laws

California already has some of the strongest data breach laws in the U.S., but thinks it can do better.

Senate Intelligence Committee Questions Healthcare Cybersecurity

Senate Intelligence Committee Questions Healthcare Cybersecurity

Democrat Senator Mark Warner is asking healthcare organizations how the Senate Intelligence Committee can aid in beefing up cybersecurity laws.

Major Security Flaws Found in Popular Password Managers

Major Security Flaws Found in Popular Password Managers

Independent Security Evaluators found some worrying flaws in popular password managers, but still suggest that you use one.

Nearly 50,000 AdventHealth Patients Impacted in Yearlong Data Breach

Nearly 50,000 AdventHealth Patients Impacted in Yearlong Data Breach

AdventHealth's system was breached for over a year, impacting 42,000 patients and their data.

Identity In A Zero Trust World

Identity In A Zero Trust World

Our solutions must continually validate the identity of the person accessing our applications and data.

Nearly 15 Million 500px Users Made Vulnerable by Breach

Nearly 15 Million 500px Users Made Vulnerable by Breach

The names, usernames, passwords and other sensitive information was leaked in July of 2018.

Featured

  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West
  • New Report Says 1 in 5 SMBs Would Be Forced to Shutter After Successful Cyberattack

    Small and medium-sized businesses (SMBs) play a crucial role in the U.S. economy, making up 99.9% of all businesses and contributing to half of the nation's GDP. However, these vital economic growth drivers face an escalating threat—cyberattacks that could put them out of business. Read Now

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.