Data Security


DHS to Boost Cybersecurity of First Responders

DHS to Boost Cybersecurity of First Responders' Tech

The Department of Homeland Security is looking to boost cybersecurity of advanced first responder technology.

Drone Maker Steps Up Security after U.S. Army Ban

Drone Maker Steps Up Security after U.S. Army Ban

The U.S. Army banned the drones after they detected “cyber vulnerabilities.”

Ransomware: How to Stop It Once and for All

Ransomware: How to Stop It Once and for All

Businesses can effectively close the market for ransomware attacks by implementing these three strategies.

Poor Cybersecurity Could Lead to Fines

Poor Cybersecurity Could Lead to Fines

UK firms could face up to £17 million in fines if they fail to protect themselves from hackers.

UK Issues Strict Security Guidelines for Connected Vehicles

UK Issues Strict Security Guidelines for Connected Vehicles

The UK, nervous about hackers gaining access to moving vehicles, has added strict guidelines to connected cars.

Four Ways Malware Sneaks on to Mobile Devices

Four Ways Malware Sneaks on to Mobile Devices

Fraudsters cast their nets wide in the hopes of snagging unaware and unsuspecting consumers who will unwittingly download malicious applications on to their mobile devices which can then be exploited for short or long-term financial gain by cybercriminals.

White House Officials Fooled by ‘Email Prankster’

White House Officials Fooled by ‘Email Prankster’

Can your employees spot a fake email?

Implementing a Data-centric Approach

A company is much more complex than an IT department or a number of buildings. It is always evolving and adding more servers, buildings and systems, and therefore, obtaining more risk, costs and threats.



Securing the City

Securing the City

Thanks to new advancements in video analytics technology and powerful Internet of Things (IoT) edge devices; these superheroes can now be armed with new superhuman capabilities to better protect us.

Being Connected

The security of corporate data is critical to the integrity of operations. Yet, everywhere we turn, it seems like another company has become victim to some form of cyber threat, malware or ransomware attack.

HBO Victim in Latest Cyberattack

HBO Victim in Latest Cyberattack

Unreleased episodes of HBO shows and Game of Thrones scripts have been leaked as a result of the attack.

Smart Appliances should have Cybersecurity Rating

Smart Appliances should have Cybersecurity Rating

Televisions, fridges and other internet-connected home appliances should carry a security rating, a police chief suggested.

The Human Side of Security:  Security Threats and Considerations For Today’s Mobile Workforce

The Human Side of Security: Security Threats and Considerations For Today’s Mobile Workforce

While flexibility is empowering the workforce, it is also complicating data security.

Preventing a “Fleet-wide” Hack is Tesla’s Top Security Priority

Preventing a “Fleet-wide” Hack is Tesla’s Top Security Priority

Elon Musk commented on Tesla’s cybsersecurity during his talk at the National Governor’s Association this weekend.

14 Trump Properties Breached by Hackers

14 Trump Properties Breached by Hackers

Guests at 14 properties bearing the name of Trump might have their credit card information breached by hackers.

University of New Haven Cyber Forensics Team Launches Digital Forensics Database

First Time Cases, Investigators Linked Globally

The Cybersecurity Struggle is Worldwide

The Cybersecurity Struggle is Worldwide

The whole world could use a cybersecurity upgrade.

New Ransomware Attach Infects Airlines, Banks and Utilities across the World

New Ransomware Attack Infects Airlines, Banks and Utilities across the World

Yesterday, PC users across the world were asking for help as ransomware took data hostage and locked users out of their computers.

Government Websites Hacked with ISIS Messages

Government Websites Hacked with ISIS Messages

Government websites in Ohio, Maryland and New York were targeted.

Members of Parliament Fall Victim to Cyber Attack

Members of Parliament Fall Victim to Cyber Attack

Fewer than 90 email accounts with weak passwords are believed to have been hacked in “sustained” attack.

Featured

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.