The European Union will begin to enforce strict data security starting in May. Here's what you should know.
- By Sydny Shepard
- Mar 07, 2018
Cybersecurity was found to be the top technology used by healthcare facilities.
- By Sydny Shepard
- Mar 06, 2018
A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.
- By Sydny Shepard
- Mar 05, 2018
Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.
- By Mark Clifton
- Mar 01, 2018
The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.
- By Courtney Dillon Pedersen
- Mar 01, 2018
E-passports store a cryptographic signature to prevent forgeries and tampering, but CBP has not deployed the software needed to verify the information, causing a security lapse.
- By Jessica Davis
- Feb 27, 2018
Due to the success of DDoS attacks, attackers are constantly evolving their techniques, so that they can target more organizations at once.
- By Robert Hamilton
- Feb 26, 2018
Cryptojacking is the act of poisoning a website to get a computer to mine cryptocurrencies unknowingly. Here's what you can do to prevent it.
- By Sydny Shepard
- Feb 23, 2018
Experts say action must be taken to control artificial intelligence tech
- By Sydny Shepard
- Feb 22, 2018
The risk associated with progress is always great and must be considered at all times.
- By Greg Robinson
- Feb 19, 2018
Cybersecurity firms are confirming that a computer malware attack dubbed "Olympic Destroyer" hit Wi-Fi systems at the Winter Games.
- By Sydny Shepard
- Feb 14, 2018
Washington state’s new cannabis-tracking system was hacked the weekend of Feb. 3, according to the Washington State Liquor and Cannabis Board (WSLCB). Among other information, the hacker stole route information associated with four days of marijuana deliveries.
- By Jessica Davis
- Feb 12, 2018
Relatively new on the market, the iKeyp is a smart safe for everyday use. It is simple to install and easy to connect with via the app on your smartphone.
- By Ralph C. Jensen
- Feb 12, 2018
Beginning in July with the release of Chrome 68, Google Chrome will mark all HTTP sites as “not secure”. The Chrome browser already displays a green lock icon and “Secure” sign in the URL bar for HTTPS-encrypted websites.
- By Jessica Davis
- Feb 12, 2018
Consumer Report says its testing found that Roku devices and Samsung Smart TVs have security flaws that make them vulnerabilities to hackers.
- By Sydny Shepard
- Feb 09, 2018
The word "ransomware" has been recognized by the Oxford English Dictionary.
- By Sydny Shepard
- Feb 06, 2018
The importance of cyber security insurance, and how businesses can increase their privacy to protect themselves against hackers.
Data storage is becoming a hot topic in the video surveillance industry and gaining more attention as retention periods continue to increase.
- By Eric Polet
- Feb 01, 2018
Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis.
- By Jonathan Lewit
- Feb 01, 2018
The President's national security team is looking at options to counter the threat of China spying on U.S. phone calls.
- By Sydny Shepard
- Jan 31, 2018