Data Security


Jimmy John’s Shops Hit by Data Breach

Jimmy John’s Shops Hit by Data Breach

Over 200 restaurants were affected

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

Sophisticated hackers able to lift fingerprints, replicate them and then use them to activate sensors on Apple smartphones.

Apple Can’t Unlock your iPhone for the Police, even with a Search Warrant

Apple Can’t Unlock Your iPhone for the Police, Even With a Search Warrant

The company says it has made it impossible in order to deflect allegations of collecting user information.

VidSys Demonstrating its New Release 7.7 PSIM Software at ASIS

National Language Support means that the software can easily adapt to various languages without code changes.

The Home Depot Hack was Easy

The Home Depot Hack was Easy

Another hack in the long line of recent cyber-attacks, Home Depot’s issues showcase a bigger problem: the simplicity of the hack

Security Partners and CheckVideo Announce Partnership

Managed video sales training teaches technology's real-time capabilities, among other imporant concepts, to sales reps.

HealthCare.gov Faces Security Breach Scare

HealthCare.gov Faces Security Breach Scare

A test version of the government’s health insurance site was hacked.

Apple Adds Additional Layer of Security to iCloud

Apple Adds Additional Layer of Security to iCloud

Three things you can do to better protect the data on your cloud.



LENSEC Teaming Up with Ingram Micro

LENSEC and Ingram Micro will roll out the new Perspective NVA at the Fall ONE Event.

AvaLAN Wireless Launches 900MHz Frequency Hopper

AW900F Industrial Wireless Ethernet delivers long range, reliable speed and secure wireless networking.

Q and A with Chief Information Security Officer at Duke University about Yubico

Q and A with Chief Information Security Officer at Duke University about Yubico

Richard Biever talks strong authentication, two-factor authentication, YubiKey, user feedback and working with Yubico.

Data Breaches: Who’s Ultimately Responsible?

In 0.27 seconds, these were the top headlines that Google pulled from 67,500 results highlighting the latest data breaches around the globe.

Google Maps Tracks Your Every Step – But You Can Stop It

Google Maps Tracks Your Every Step – But You Can Stop It

A little-known data collecting process by Google can be switched off.

Real-Time Technology Group Partners with All Points to Deliver Advanced Identity Management

Real-Time Technology Group Partners with All Points to Deliver Advanced Identity Management

Partnership enables RTTG to bring their Real-Time Verification (RTV) technology platform to state and federal customers.

Action Steps for Parents to Do Today to Protect Student Data

Action Steps for Parents to Do Today to Protect Student Data

These actions will help put you back in control of your child's data.

How Schools Use Private Student Data

How Schools Use Private Student Data

Non-educators want access to student data to apply principles of big data analysis to it.

POS Systems in Terrible State of Security

POS Systems in Terrible State of Security

Same malware used in Target attack also targeted more than a thousand other U.S. businesses.

UPS Confirms Data Breach

UPS Confirms Data Breach

The shipping company found that 51 stores have been hacked

New Website Publicly Shames Apps and Services without Encryption

New Website Publicly Shames Apps and Services without Encryption

Companies called out for jeopardizing the security and privacy of their users.

Hospital Security Breach Steals Data from 4.5 Million Patients

Hospital Security Breach Steals Data from 4.5 Million Patients

Community Health Systems in Central Florida hospitals are affected by the breach

Featured

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.