Data Security


Top 5 Tips to Prevent Data Breaches

Top 5 Tips to Prevent Data Breaches

With hacks, attacks, ransoms and even extortion attempts, 2017 has been the year of data breaches, and it’s not even over yet.

"Gray Saturday" Safer for Online Shopping

"Gray Saturday" Safer for Online Shopping

Kaspersky Lab’s review of phishing attacks during the holiday sales season found that the number of phishing attacks can decrease by as much as 33 percent on the day after Black Friday.

Vulnerability in Amazon Key

Vulnerability in Amazon Key's Camera Allows Couriers Back in Your House

Amazon has addressed the hack and will be rolling out an update next week.

Google Details New Pixel 2 Security Module

Google Details New Pixel 2 Security Module

The goal of the new security module, Google said, is to prevent attackers from decrypting your data without knowing your password by reinforcing the lock screen against attacks.

Hackers Trick Face ID with 3-D Printed Mask

Hackers Trick Face ID with 3-D Printed Mask

Days after the iPhone X’s official release, hackers in Vietnam have successfully tricked Face ID and unlocked the smartphone with a 3-D-printed mask.

Survey Reveals Serious IoT Concerns

Survey Reveals Serious IoT Concerns

The survey was based on responses from 603 IT and line-of-business decision-makers involved in enterprise security teams across the US, UK, Germany, France, Australia and New Zealand.

iOS 11 Security and Privacy Settings to Check Right Now

iOS 11 has some settings you should adjust to keep a tighter lid on your online privacy and security.

Trump Account Deactivation Raises Twitter Security Questions

Trump Account Deactivation Raises Twitter Security Questions

The temporary deactivation Thursday of the personal Twitter account of President Donald Trump, @realDonaldTrump, by a customer support employee on their last day of employment has raised questions about Twitter’s internal security.



iPhone X Face ID May Risk User's Facial Data

The iPhone X releases today, and with it come more concerns about the privacy and security of its new Face ID feature.

Data Breaches That Will Haunt You

Data Breaches That Will Haunt You

This year has been filled with some of the biggest data breaches in history, which is a truly horrific thought.

Three Technologies That Will Change Your Business

3 Security Technologies to Invest Time in Researching

How researching and investing in these three technologies will change your business

3 Online Tools to Help Businesses Prevent Cyberattacks

3 Online Tools to Help Businesses Prevent Cyberattacks

Without these online tools, your business could be vulnerable to cyberattacks risking the information of your employees and customers.

Ransomware Targets Transit and Goverment Organizations in Ukraine, Russia

Ransomware Targets Transit and Goverment Organizations in Ukraine, Russia

A new ransomware called Bad Rabbit (variant of Petya) is spreading through Ukraine and Russia.

Bank of America Boosts Online Security with Biometrics

Bank of America Boosts Online Security with Biometrics

Bank of America will start using an additional layer of authentication for online banking.

How to be Effective in the Wake of a Cyberattack

How to be Effective in the Wake of a Cyberattack

Helping you be prepared if an attack happens

Researchers Find Ways to Boost Security of Voice Control

Researchers Find Ways to Boost Security of Voice Control

Voice activated systems are vulnerable to hacking. Researchers from Michigan have found ways to bolster their security.

Vulnerability in Children

Vulnerability in Children's Smart Watch Could Reveal Location

Some smart watches geared towards children have series security flaws.

DHS Demands Basic Email Security

DHS Demands Basic Email Security

DHS will issue a "binding directive" which will require the implementaion of security measures for email.

University Hack Leaves Professors

University Hack Leaves Professors' Data Vulnerable

A University of Kansas student was able to use a keystroke logger to gain access to a professor's computers and change his grades.

Security Flaw Leaves Wi-Fi Devices Vulnerable to Hackers

Security Flaw Leaves Wi-Fi Devices Vulnerable to Hackers

The hole in Wi-Fi security affects the vast majority of Wi-Fi devices and networks.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”