Network-Centric Security


Criminal Intent

Criminal Intent

As more of our lives move online, crime has unfortunately migrated to the internet at matching pace taking form in what’s now considered cybercrime.

The Age Of Collaboration

The organizations of today have a wealth of technology at their fingertips, highlighting new features and advancements that are changing the way these entities do business, how people work and the interconnectivity between the two.

Held Hostage

Ransomware attacks are becoming infamous. As I write now, the Petya attack is unfolding.

The IP Evolution

A few advantages with IP-based systems worth mentioning are remote access anytime, anyplace; digital images do not degrade over time; real time analytic capability; and content distributed electronically quickly and easily.

Bluetooth Security Flaw Puts Billions at Risk

Bluetooth Security Flaws Puts Billions at Risk

A set of vulnerabilities present in "almost every" device with Bluetooth capabilities has been revealed by researchers at security firm Armis.

How to Respond - Encryption is used to foil decryption tools

How to Respond

Between 2005 and 2016, ransomware infections were more common than data breaches, making them the most pervasive cyber threat of the last 11 years. Ransomware attacks may encrypt folders and files or even the entire hard drive, or they may just lock the devices so that users cannot access them.

The Backbone

The Backbone

For many years, the sage advice for cybersecurity leaders has been to take a layered approach to security, and those words have served the industry well. Unfortunately, cracks in those layers continue to leave organizations vulnerable to security attacks.

Encryption to Cyber Bullying

The most pervasive cyber threat in the past 11 years has been ransomware infections. Who would have even known about something like this 30 years ago, but here we are trying with all diligence to protect folders and files, or even worse, the entire hard drive.



Protecting ATM Connections

With the rising popularity of the Internet accessible machines, the need to protect connections between the disparate ATMs and the banks’ processing centers became critical.

Thermal Cameras are Hot

Thermal Cameras are Hot

Network thermal cameras were first introduced to the security market in 2010 filling a critical detection gap in network video systems.

An Ounce of Prevention

An Ounce of Prevention

Common sense dictates that it is easier to stop something from happening in the first place than to repair the damage after it has been done.

Not a Catch-all

Not a Catch-all

When used effectively, biometrics can contribute to safer cybersecurity practices.

Security Strategy

Security Strategy

While many security teams at retailers are concerned about the potential for a big data breach, everyday security threats, like social engineering and shoplifting, are heightened in a world of omni-channel retail.

The Role of PIAM

The Role of PIAM

The proliferation of networked devices has increasingly brought IT to the table when discussing physical security.

Layered Approach

Layered Approach

The IT approach to layered security for systems, infrastructure and data is increasingly impacting the security department, and with good reason.

Rapid Growth

According to IHS, last year an estimated 66 million network cameras were shipped globally, which led to a 48 percent increase in the raw capacity of enterprise storage for video surveillance.

Company Credential

By fully identifying and mitigating the practices which leave businesses vulnerable—and then investing in employee awareness training—you’ll greatly reduce risk while cultivating a more educated workforce.

Not a Catch-all

Not a Catch-all

While the technology can add an effective, additional layer of cybersecurity, it’s not a catch-all. In fact, the very nature of biometric technology can introduce additional security gaps.

Network Protection

Hacking has become a threat far bigger than most think. Indeed, the greatest threat to national security these days comes from not from aircraft carriers or infantry divisions, but a computer with a simple Internet connection located anywhere in the world.

Best Practices in the Healthcare Industry

Hospitals and medical centers face a number of challenges related to ensuring a safe environment for patients, staff, and visitors.

  • Securing Entertainment Venues Securing Entertainment Venues

    One thing entertainment venues, sports stadiums and theme park officials want to accomplish is getting people back into their seats. That is happening today—but not without understanding and technology. In this episode, AJ DeRosa shares his insight on how COVID-impacted businesses are able to face safety and security issues with confidence and technology. We also discuss visitor expectations and how venue officials can ensure their space is secure as they welcome visitors back.

Digital Edition

  • Security Today Magazine - November December 2021

    November / December 2021

    Featuring:

    • Navigating System Integration
    • Protecting Premises and People
    • Cashing in Your VMS System
    • Encryption and Compliance
    • Security Breach at 38,000 Feet

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety