Data Security


Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security firm LogRhythm has predicted the internet will shut down for 24 hours in 2017 due to a massive DDoS attack.

Biggest Security Incidents of 2016

Biggest Security Incidents of 2016

Vehicle attacks, hacks and police ambushes make the list of top physical security events of 2016.

Guide for Protecting your Company against Insider Threats

Guide for Protecting your Company against Insider Threats

Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.

2017 Encryption Landscape

2017 Encryption Landscape

There is a growing belief that 2017 will be a decisive year in the battle over encryption that has been quietly raging for over 25 years.

Yahoo Hacked… Again

Yahoo Hacked... Again

Yahoo said 1 billion accounts were affected in the 2013 hack.

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics' mobile application was hacked leaving the health information of about 34,000 people vulnerable.

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Several routers, including those in the popular “Nighthawk” series, are affected.

Best Practices for Securing Documents

Best Practices for Securing Documents

Exploring basic best practices for securing documents on your computer and smartphone



Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Now, the understanding of cloud technology and its value are clear, but safety often comes into question for security professionals.

Facebook Isn

Online Exclusive: Facebook Isn't Safe!

Close the door on Locky ransomware infection via Facebook

Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Online Exclusive: Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Leveraging artificial intelligence and machine learning allows organizations to enjoy real time protection and risk identification, significantly reducing security risks without the need to increase staff.

Snowden Leak Caused ‘Tremendous’ Damage to U.S. Security

Snowden Leak Caused 'Tremendous Damage' to U.S. Security

A U.S. House committee issued a scathing report accusing Snowden of causing damage to U.S. security.

3 Ways iOS 10 Brings Security to Your iPhone

3 Ways iOS 10 Brings Security to Your iPhone

The top iPhone features that guard your privacy and security.

4 Critical Components of Tomorrow’s Cyber Security Incident Response

4 Critical Components of Tomorrow's Cyber Security Incident Response

Each of these four key components are essential in establishing a solid defense against would-be cyber-attacks.

Intel Open to Selling Security Software Business

Intel Open to Selling Security Software Business

Intel could never make full use of the McAfee business, which it bought in 2010.

Dave Larson, COO of Corero Network Security, discusses DDoS attacks.

Online Exclusive: DDoS Attacks Fuel the Need for Modern Protection Methods

DDoS attack prevention is nearly impossible: it’s difficult to track down hackers, whereas it’s easy and inexpensive to launch a DDoS attack.

Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.

Thousands of Credit Cards Stolen from Acer Online Store

Thousands of Credit Cards Stolen from Acer Online Store

Acer has admitted to a data breach that affects more than 30,000 customers.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

NFL Hires Cybersecurity Firm after Social Media Hacks

NFL Hires Cybersecurity Firm after Social Media Hacks

The NFL has hired cybersecurity firm, K2 Intelligence, to help teach players how to use social media.

Featured

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3