Data Security


FBI Facial Recognition Database Contains Images of the Innocent

FBI Facial Recognition Database Contains Images of the Innocent

By 2015 Next Generation Identification (NGI) will have millions of stored facial images.

Retail Checklist: 8 Tips for Secure Payments Processing

Retail Checklist: 8 Tips for Secure Payments Processing

When selecting a payment processor be sure to select one that has these characteristics to maintain secure data integrity.

Educating Without Surveillance

Educating Without Surveillance

According to Saddleback College Chief of Police, Christopher Wilkinson, the childcare center in particular was a top priority due to concerns related to the Sandy Hook Elementary tragedy and other similar violent incidents.

Building a Secure Cloud Environment A secure IT strategy often emerges as a key concern

Building a Secure Cloud Environment

When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.

Solink Introduces Contextual Analytics to Help Customers use Video to See Big Data

Unique, event-based video discover platform coming to ISC West 2014.

Facebook Cracks Down on Gun Posts with New Regulations

Facebook Cracks Down on Gun Posts with New Regulations

Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)

Reaching out with a higher level of video storage and management

A New World of Information

We live in a world full of information as data is being collected each day because the demand is higher than ever before. Consumers want faster access to online data to make quicker, more informed decisions regarding everything from nearby restaurants to the highest-rated tablets.



Apple Encryption Flaw Leaves Data Vulnerable to Hackers

Apple Encryption Flaw Leaves Data Vulnerable to Hackers

Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.

Your Vendors: Cold Beer or Malicious Attack Vector?

Your Vendors: Cold Beer or Malicious Attack Vector?

The five golden rules of developing a strong network security strategy for managing vendor access.

Keeping assets well protected

Keeping Assets Well Protected

There are tens of thousands of bank branches and financial services locations throughout the world. The business environment itself is complex, as it combines elements of high-end commercial services with a frontline, retail component.

Increasing Security with Smart Credentials

Increasing Security with Smart Credentials

For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.

Forget Your Passwords

Looks like it is just about time for biometrics to make its long awaited debut. Yes, we have seen biometrics for quite some time, and it is true that the impact has been strong in the security world. But, get ready to see biometrics on steroids. It’s coming.

Michael’s Arts and Crafts Store Dealing with Possible Data Breach

Michael’s Arts and Crafts Store Dealing with Possible Data Breach

Things you need to do NOW if you have recently shopped at this arts and crafts store.

Target Hack Affected 70 Million Customers

Target Hack Affected 70 Million Customers

As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.

Web users need to take the initiative and read the privacy policies of the privacy platforms they

As Online Privacy Becomes Commercialized, Consumers Need to Get Educated

Commercial Virtual Private Networks (VPNs) are playing an increasing role in the current battle between privacy-conscious web users and government agencies seeking to increase their surveillance reach. But as online privacy becomes yet another product, ready to be branded and packaged, the problem of dishonest vendors, and a lack of education amongst customers, threatens to undermine any real benefit the market can bring.

The 12 Days of Security Tips

The 12 Days of Security Tips

Over the next 12 days, check back for updated safety and security tips, clever lyrics and holiday fun with Security Today as we explore the 12 Days of Christmas...security style!

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

What you can do to help prevent your social media login credentials from getting stolen.

OnSSI Partners with Code Blue for Comprehensive Situational Security Solution

OnSSI Partners with Code Blue for Comprehensive Situational Security Solution

Integrated system offers improved response and management control.

On The Fast Track

On the Fast Track

Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.

Featured

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.