Data Security


2017: The Year Encryption Goes Wild

2017: The Year Encryption Goes Wild

Maybe it’s time for a different (and maybe more affordably efficient) approach.

Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security firm LogRhythm has predicted the internet will shut down for 24 hours in 2017 due to a massive DDoS attack.

Biggest Security Incidents of 2016

Biggest Security Incidents of 2016

Vehicle attacks, hacks and police ambushes make the list of top physical security events of 2016.

Guide for Protecting your Company against Insider Threats

Guide for Protecting your Company against Insider Threats

Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.

2017 Encryption Landscape

2017 Encryption Landscape

There is a growing belief that 2017 will be a decisive year in the battle over encryption that has been quietly raging for over 25 years.

Yahoo Hacked… Again

Yahoo Hacked... Again

Yahoo said 1 billion accounts were affected in the 2013 hack.

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics' mobile application was hacked leaving the health information of about 34,000 people vulnerable.

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Several routers, including those in the popular “Nighthawk” series, are affected.



Best Practices for Securing Documents

Best Practices for Securing Documents

Exploring basic best practices for securing documents on your computer and smartphone

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Now, the understanding of cloud technology and its value are clear, but safety often comes into question for security professionals.

Facebook Isn

Online Exclusive: Facebook Isn't Safe!

Close the door on Locky ransomware infection via Facebook

Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Online Exclusive: Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Leveraging artificial intelligence and machine learning allows organizations to enjoy real time protection and risk identification, significantly reducing security risks without the need to increase staff.

Snowden Leak Caused ‘Tremendous’ Damage to U.S. Security

Snowden Leak Caused 'Tremendous Damage' to U.S. Security

A U.S. House committee issued a scathing report accusing Snowden of causing damage to U.S. security.

3 Ways iOS 10 Brings Security to Your iPhone

3 Ways iOS 10 Brings Security to Your iPhone

The top iPhone features that guard your privacy and security.

4 Critical Components of Tomorrow’s Cyber Security Incident Response

4 Critical Components of Tomorrow's Cyber Security Incident Response

Each of these four key components are essential in establishing a solid defense against would-be cyber-attacks.

Intel Open to Selling Security Software Business

Intel Open to Selling Security Software Business

Intel could never make full use of the McAfee business, which it bought in 2010.

Dave Larson, COO of Corero Network Security, discusses DDoS attacks.

Online Exclusive: DDoS Attacks Fuel the Need for Modern Protection Methods

DDoS attack prevention is nearly impossible: it’s difficult to track down hackers, whereas it’s easy and inexpensive to launch a DDoS attack.

Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.

Thousands of Credit Cards Stolen from Acer Online Store

Thousands of Credit Cards Stolen from Acer Online Store

Acer has admitted to a data breach that affects more than 30,000 customers.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

Featured

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.