Data Security


China Hacking Exposes Millions of U.S. Workers

China Hacking Exposes Millions of U.S. Workers

The Obama administration a breach on government workers could affect up to four million citizens.

Proficio Introduces ProSCAN Remediation Management Service

Brings new ease, speed, efficiency to enterprise compliance and breach prevention.

USA Freedom Act Approved by Senate and Signed by President Obama

USA Freedom Act Approved by Senate and Signed by President Obama

Phone companies to retain data while NSA must get permission from federal court.

Navigating the Ever Evolving Threat Landscape

Navigating the Ever Evolving Threat Landscape

No matter where you look in the retail sector today, the market seems to be in a perpetual state of transition when it comes to security.

Five Ways to Help Secure Your Data in Light of the IRS Breach

Five Ways to Help Secure Your Data in Light of the IRS Breach

Action steps people can take to make it more difficult for hackers.

Facebook Baits Users with Security Checkup

Facebook Baits Users with Security Checkup

Company provides security features and tools to empower individual account users.

First Online Security Game Launched to Help Educate and Raise Awareness

IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.

Rating a Company

Rating a Company's Security Effectiveness

Tallying the number of alerts and breaches doesn't tell the whole story.



Password Recovery Questions are a Terrible Way to Protect Online Accounts

Password Recovery Questions are a Terrible Way to Protect Online Accounts

A new research paper found that people often choose obvious answers that are easy for hackers to guess.

United Airlines Will Pay Bug Hunters in Air Miles

United Airlines Will Pay Bug Hunters in Air Miles

The airline will pay a maximum of one million miles to anyone who can prove a remote code execution.

Survey Shows Millennials Represent Greatest Risk to Corporate Data

Absolute Software report uncovers usage behavior and security risks of connected employees.

Intercede Teams Up with Citrix to Deliver Strong Authentication

MyID technology allows customers to sign and encrypt email from mobile devices securely using WorxMail.

Hackers Have Figured Out How to Steal from Starbucks Cards

Hackers Have Figured Out How to Steal from Starbucks Cards

Users who have auto-reload setup on their digital card might be vulnerable.

Smart Payment Association Releases Total Market Estimate 2014 Figures

Close to half of cards featured contactless payment capability.

Hard Rock

Hard Rock Reports Security Breach

The hotel & casino says hackers may have access to information about credit and debit cards.

More Comfortable Operations

Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.

CSID Integrates Identity Chek Service Alerts from Early Warning

New offering provides consumers added protection against identity theft through bank account takeover and credit card application fraud alerts.

Verizon Data Breach Study Finds Olds Flaws Still Dangerous

Verizon Data Breach Study Finds Olds Flaws Still Dangerous

The 2015 edition of the DBIR provides insight into the state of cyber-security in 2014.

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

Online Exclusive: ‘Integrated Security’ – Not Just an Industry Buzzword

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

White House Computers are Vulnerable to Hackers

White House Computers are Vulnerable to Hackers

An official has stated that unclassified computers at the White House are vulnerable.

Featured

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.