The number and breadth of devices that make up the Internet of Things (IoT) continues to grow rapidly, with everything from kitchen appliances to video surveillance and access control systems offering the ability to connect to a network.
- By Ryan Zatolokin
- Sep 01, 2019
We know by now that there is an abundance of business advantages in the cloud — it’s agile and cost-efficient, and, with little to no hardware maintenance, it’s easier to update and perform maintenance on than traditional on-site servers.
A new IT trend–“hyperconvergence”–may hold the key to simplifying this task while also enabling significantly more sophisticated ways to tap the value of data many organizations are already collecting.
- By Eric Bassier
- Sep 01, 2019
Security professionals face many challenges in selecting video surveillance systems that address their unique needs.
- By Jeff Whitney
- Sep 01, 2019
Two Nigerian citizens are accused of leading a massive fraud scheme that transferred at least $6 million in fraudulently-obtained funds, much of whom was taken from elderly people.
- By Haley Samsel
- Aug 26, 2019
As countries across Europe grapple with the consequences of facial recognition software, EU officials are seeking to limit what the technology can collect and how the data is used.
- By Haley Samsel
- Aug 26, 2019
The impact of GDPR, the increasing number of issues with shadow IT and the more advanced solutions for IoT devices are among the most surprising trends.
- By Michael Volkmann
- Aug 23, 2019
Only eight breaches were responsible for the exposure of 3.2 billion records in the first half of the year, according to new research.
- By Haley Samsel
- Aug 22, 2019
The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”
- By Haley Samsel
- Aug 20, 2019
Neglecting basic security practices exposes companies to long-standing security threats.
- By Gilad David Maayan
- Aug 19, 2019
In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.
- By Haley Samsel
- Aug 16, 2019
Suprema, which operates the Biostar 2 biometric smart lock system, leaked over 27.8 million records in a publicly accessible database discovered by security researchers.
- By Haley Samsel
- Aug 15, 2019
Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.
- By Haley Samsel
- Aug 13, 2019
Deploying automated decoys can help protect your network and reduce IT costs.
- By Gilad David Maayan
- Aug 12, 2019
Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.
- By Bud Broomhead
- Aug 08, 2019
Why corporations owe it to you and society as a whole to stop data breaches and fraud
- By Simon Marchand
- Aug 05, 2019
Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network
How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests
- By Evan Francen
- Aug 02, 2019
The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.
- By Richard Kanadjian
- Aug 01, 2019
A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.
- By Haley Samsel
- Jul 31, 2019