Networking Security


Yahoo Claims a Server Attack was not the Shellshock Bug

Yahoo Claims a Server Attack was not the Shellshock Bug

Yahoo officials made a statement regarding a bug that was discovered by hackers looking to exploit the system.

Fluidmesh Solutions Make a Splash at Magic Waters Waterpark

The objective: to create an additional network throughout the park as a back up to aging fiber network.

HealthCare.gov Faces Security Breach Scare

HealthCare.gov Faces Security Breach Scare

A test version of the government’s health insurance site was hacked.

The ABCs of PoE

With the introduction of IP cameras, system integrators have experienced big improvements in the quality and performance of video systems that can be offered to their customers.

Where Current SMS Authentication Fails, the Next Generation Succeeds

Jane and Jake work for the same company. This week they’re on one of those dreaded road trips—three cities in four days—and are, as we all are, completely dependent on their tools of choice while on the move.

IT Security Compliance for Cloud Service Providers

Compliance with increasingly stringent regulations for organizations providing outsourced IT services, particularly in regards to data protection, is becoming more difficult.

Taking Charge Organizations must stop relying on their Internet service providers to protect them from attacks and take matters into their own hands

Taking Charge

Distributed Denial of Service (DDoS) attacks are some of the oldest Internet threats and continue to be the top risk to networks around the world.

A Brave New World Power protection is significant in the networking and IP camera space

A Brave New World

While businesses will spend thousands of dollars on cameras and recording systems, alarms, intrusion detection, emergency communication and theft prevention, many overlook the need for systems’ power protection.



A How-To Guide on Building a Federal Information Security Team

A How-To Guide on Building a Federal Information Security Team

Here is a list to help develop an all-star team of employees that will protect your information.

Should You Expect Your Security Software to Predict The Future?

Should You Expect Your Security Software to Predict The Future?

6 steps on predicting the future of your network's security: process, enhance, cross-correlate, baseline and analyze information.

Adding a Razberi to the Mix

Adding a Razberi to the Mix

Throughout Mexico, residents trust Presta Prenda de Banco Azteca for short-term, secured loans on jewelry, electronics and other valuables. Much like the pawn shop business model in the United States, Presta Prenda customers obtain immediate cash with various repayment options.

Media Conversion

Media Conversion

When a successful European toy manufacturer outgrew its facilities, it built a new, three-facility campus that included an office along with manufacturing and warehouse space.

Critical to Healthcare Security

Critical to Healthcare Security

Ensuring the safety and security of patients and employees is critical to healthcare organizations of any size. For larger facilities, the task can seem monumental, leading many in the industry to turn to IP network surveillance technology to help take control of the process.

Building the Intelligent Edge

Building the Intelligent Edge

Philosophical and physical shifts in intelligence and management at the edge are remaking corporate networks.

The Next Step in ID Verification

The Next Step in ID Verification

“Banks Heap Suits on Target over Breach,” read a recent headline of a Wall Street Journal story. By that time, seven financial institutions had already filed class action suits against the retail giant alleging it did not sufficiently protect its customer’s data.

Preventing the New Threat

When most people consider cybersecurity, they think about protecting the information that resides on their computers—sensitive emails, folders or files.

Providing a Healthy Balance

Providing a Healthy Balance

Datacenter traffic is predicted to triple by 2017 with the cloud as the biggest traffic source, according to a recent Cisco Global Cloud Index study.

Raising Concerns

Raising Concerns

Wireless transmission is usually a topic that raises many concerns in the security world. It seems common knowledge nowadays that a wireless network can be easily hacked, and private information can end up on the Internet or someone’s identity can be stolen.

Building a Secure Cloud Environment A secure IT strategy often emerges as a key concern

Building a Secure Cloud Environment

When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3