Data Security


Nuclear Regulatory Commission Computers Hacked

Nuclear Regulatory Commission Computers Hacked

Internal investigation reveals three breaches in past three years, twice foreign related and once unidentifiable.

Symantec Combines Nine Norton Products to Create One Service

Symantec Combines Nine Norton Products to Create One Service

The product can be used on Windows, OS X, Android, and iOS

Security Fears Restricting Mobile Commerce in the US

Almost half of consumers would never use mobile payment and banking apps due to fears about the level of security on their devices, with suspicions highest in the over 55 age group.

7 Things Security Professionals Can Learn from Robin Williams

7 Things Security Professionals Can Learn from Robin Williams

Movie quotes offer great insights and knowledge to enhance the security industry.

Security Holes Found in some DLP Products

Security Holes Found in some DLP Products

Two researchers planned to reveal their findings at Black Hat USA.

Voltage SecureData z/Protect Provides Reliable, Standards-based Protection

Breakthrough encryption and tokenization technologies deliver a new level of safety in today’s risk-prone, online transactional world.

U.S. Homeland Security Contractor Acknowledges Computer Breach

US Homeland Security Contractor Acknowledges Computer Breach

The company says it has all the markings of a state-sponsored attack.



Facebook Follows its Users across Cyberspace

Facebook Follows its Users across Cyberspace

4 ways to battle this social media giant to beat them at their own game.

Hackers steal 1.2 billion Usernames and Passwords

Hackers Steal 1.2 Billion Usernames and Passwords

Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.

Google Turns in Man with Child Porn

Google Turns in Man with Child Porn

The internet company found illegal images in his Gmail account.

Application Single Sign-on – Benefits and Considerations

Application Single Sign-on – Benefits and Considerations

Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.

33 P.F. Chang Restaurants Affected in Data Breach

33 P.F. Chang Restaurants Affected in Data Breach

A security breach in June might have led to customer data theft.

Unlock Your Smartphone with a Tattoo

Unlock Your Smartphone with a Tattoo

Place a round, nickel-sized sticker on your skin where it’s easily accessible and tap your smartphone on the sticker to unlock it.

Your Biometric Accepted Here

Your Biometric Accepted Here

While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits.

Undetectable Security Flaw Found in USBs

Undetectable Security Flaw Found in USBs

Reverse engineered firmware revealed an embedded controller chip that could be the beginning of wreaking havoc on computer systems.

EU Google, Microsoft and Yahoo Meet on

EU, Google, Microsoft and Yahoo Meet on 'Right to be Forgotten'

Questions still remain about the implementation and effectiveness of this rule.

The Ultimate Cybersecurity Fix

The Ultimate Cybersecurity Fix

Typewriter sales in German economy boom as tool to thwart cyber spying.

SecureNet Simplifies Payment Integration with Launch of Single Stack of APIs

Enhancements give developers access to a single stack of development-language-agnostic APIs for both card-present and card-not-present transactions, allowing for easier integration across all channels.

StubHub the Victim of Cyber Fraud

StubHub the Victim of Cyber Fraud

Authorities to announce the who they arrested and the number people victimized.

Featured

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.