Networking Security


Managing the Risks - BYOD: Bring Your Own Device

Managing the Risks

The impact of flexibility when working through BYOD on businesses, where an employee is able to access the corporate network anywhere, anytime, has brought many benefits—increased productivity, less wasted time on travel and saving on overhead.

Giving Your Surveillance Network a Workout

With so many applications riding on today’s networks, bandwidth consumption on Wide Area Network (WAN) connections, particularly over the Internet, creates real challenges for network professionals on a budget.

On a Clear Path

Today, there are countless manufacturers that claim to have a clear migration path toward an open architecture platform; however, there is simply no clear path that applies to all applications.

BadUSB is Haunting Cyber Space

The ABC’s of Cyber Security

It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world.

BadUSB is Haunting Cyber Space

BadUSB is Haunting Cyber Space

Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!

New Clear Series 2 HDMI Packaging Blends Retail Beauty with Custom AV Functionality

Ice Cable Systems new smart packaging makes great first impression while benefiting the installation process.

Yahoo Claims a Server Attack was not the Shellshock Bug

Yahoo Claims a Server Attack was not the Shellshock Bug

Yahoo officials made a statement regarding a bug that was discovered by hackers looking to exploit the system.

Fluidmesh Solutions Make a Splash at Magic Waters Waterpark

The objective: to create an additional network throughout the park as a back up to aging fiber network.



HealthCare.gov Faces Security Breach Scare

HealthCare.gov Faces Security Breach Scare

A test version of the government’s health insurance site was hacked.

The ABCs of PoE

With the introduction of IP cameras, system integrators have experienced big improvements in the quality and performance of video systems that can be offered to their customers.

Where Current SMS Authentication Fails, the Next Generation Succeeds

Jane and Jake work for the same company. This week they’re on one of those dreaded road trips—three cities in four days—and are, as we all are, completely dependent on their tools of choice while on the move.

IT Security Compliance for Cloud Service Providers

Compliance with increasingly stringent regulations for organizations providing outsourced IT services, particularly in regards to data protection, is becoming more difficult.

Taking Charge Organizations must stop relying on their Internet service providers to protect them from attacks and take matters into their own hands

Taking Charge

Distributed Denial of Service (DDoS) attacks are some of the oldest Internet threats and continue to be the top risk to networks around the world.

A Brave New World Power protection is significant in the networking and IP camera space

A Brave New World

While businesses will spend thousands of dollars on cameras and recording systems, alarms, intrusion detection, emergency communication and theft prevention, many overlook the need for systems’ power protection.

A How-To Guide on Building a Federal Information Security Team

A How-To Guide on Building a Federal Information Security Team

Here is a list to help develop an all-star team of employees that will protect your information.

Should You Expect Your Security Software to Predict The Future?

Should You Expect Your Security Software to Predict The Future?

6 steps on predicting the future of your network's security: process, enhance, cross-correlate, baseline and analyze information.

Adding a Razberi to the Mix

Adding a Razberi to the Mix

Throughout Mexico, residents trust Presta Prenda de Banco Azteca for short-term, secured loans on jewelry, electronics and other valuables. Much like the pawn shop business model in the United States, Presta Prenda customers obtain immediate cash with various repayment options.

Media Conversion

Media Conversion

When a successful European toy manufacturer outgrew its facilities, it built a new, three-facility campus that included an office along with manufacturing and warehouse space.

Critical to Healthcare Security

Critical to Healthcare Security

Ensuring the safety and security of patients and employees is critical to healthcare organizations of any size. For larger facilities, the task can seem monumental, leading many in the industry to turn to IP network surveillance technology to help take control of the process.

Building the Intelligent Edge

Building the Intelligent Edge

Philosophical and physical shifts in intelligence and management at the edge are remaking corporate networks.

Featured

  • Survey: Less Than Half of IT Leaders are Confident in their IoT Security Plans

    Viakoo recently released findings from its 2024 IoT Security Crisis: By the Numbers. The survey uncovers insights from IT and security executives, exposes a dramatic surge in enterprise IoT security risks, and highlights a critical missing piece in the IoT security technology stack. The clarion call is clear: IT leaders urgently need to secure their IoT infrastructure one application at a time in an automated and expeditious fashion. Read Now

  • ASIS International and SIA Release “Complexities in the Global Security Market: 2024 Through 2026”

    ASIS International and the Security Industry Association (SIA) – the leading security associations for the security industry – have released ”Complexities in the Global Security Market: 2024 Through 2026”, a new research report that provides insights into the equipment, technologies, and employment of the global security industry, including regional market breakouts. SIA and ASIS partnered with global analytics and advisory firm Omdia to complete the research. Read Now

  • President Biden Issues Executive Order to Bolster U.S Port Cybersecurity

    On Wednesday, President Biden issued an Executive Order to bolster the security of the nation’s ports, alongside a series of additional actions that will strengthen maritime cybersecurity and more Read Now

  • Report: 15 Percent of All Emails Sent in 2023 Were Malicious

    VIPRE Security Group recently released its report titled “Email Security in 2024: An Expert Look at Email-Based Threats”. The 2024 predictions for email security in this report are based on an analysis of over 7 billion emails processed by VIPRE worldwide during 2023. This equates to almost one email for everyone on the planet. Of those, roughly 1 billion (or 15%) were malicious. Read Now

Whitepapers

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3