Data Security


Verizon Data Breach Study Finds Olds Flaws Still Dangerous

Verizon Data Breach Study Finds Olds Flaws Still Dangerous

The 2015 edition of the DBIR provides insight into the state of cyber-security in 2014.

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

Online Exclusive: ‘Integrated Security’ – Not Just an Industry Buzzword

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

White House Computers are Vulnerable to Hackers

White House Computers are Vulnerable to Hackers

An official has stated that unclassified computers at the White House are vulnerable.

Apriva Enables Government Employees and Contractors to Access Sensitive Information on Tablets

Expanded BT200Z smart card reader includes support for Windows 8.1.

Publication Gets Access to City

Publication Gets Access to City's License Plate Database

Believed to be the largest dataset ever publicly released in the United States.

Hilton Awards Program Flaw Exposed All Accounts

Hilton Awards Program Flaw Exposed All Accounts

A flaw was discovered in the Hilton HHonors program that could let anyone hijack all accounts.

BCDVideo Releases High-density SAN for Video Storage

SuperNova Series delivers on scalability, reliability, and price.

Vanderbilt Announces Strategic Alliance with SwiftData Technology

Partnerships combines access control and security management solutions with DME.



Diebold and Eagle Eye Networks Announce Strategic Alliance

New video solutions offer services that stream and store live and recorded video, provide flexible cloud storage and generate notification and real-time analytics.

PlayStation Users Suffering Social Engineering Attacks

PlayStation Users Suffering Social Engineering Attacks

Causing fraudulent charges to appear on credit cards and users being locked out of accounts.

Secret Meeting Reveals How to Break Apple

Secret Meeting Reveals How to Break Apple's Security

Security researchers meet to discuss tactics and strategies for exploiting security flaws in iPhones and iPads.

Apple Watch

The Security Features of the Apple Watch

We don’t know much yet, but Apple has shown a few features that will help keep your information safe.

CertainSafe Prevents Payment Card Industry Data Breaches

MicroTokenization adds protection to data “around the card," adding to the newest requirement set for October 2015 EMV Standards.

Airport Security Mix-Up Brings NFL Player to Elementary School

Airport Security Mix-Up Brings NFL Player to Elementary School

The player accidentally swapped laptops with a principal while going through security.

Clinton

Clinton's E-mail System Not As Secure As Intended

A misconfigured encryption system left it vulnerable to hacking.

Chip-enabled Credit Cards Not the Answer to Security Vulnerabilities

Chip-enabled Credit Cards Not the Answer to Security Vulnerabilities

Cost is in the billions but only addresses a narrow range of security issues.

Security flaw from the ‘90s is still a problem today

Security flaw from the '90s is still a problem today

The flaw leaves Apple and Android users vulnerable.

Utah System of Higher Education Requests $2 Million for Security

Utah System of Higher Education Requests $2 Million for Security

Higher education leaders are asking the state for more money to help protect universities from IT security threats.

Scammers Taking Advantage of Apple Pay

Scammers Taking Advantage of Apple Pay

Criminals are using the platform to buy goods with stolen identities and credit cards

WiFi-connected Toys May Stalk Children

WiFi-connected Toys May Stalk Children

Just how safe will the "Internet of Toys" be for your children?

Featured

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.