Top Stories


British Parliament on Lockdown after Incident Outside

London: ISIS Claims Attack, Number Injured Rises, Suspect Identified

London police responded to a security incident outside the UK House of Commons.

Tech Ban on Some Foreign Flights into the US

Tech Ban on Some Foreign Flights into the U.S.

TSA recently ordered nine airlines to stop passengers from bringing most types of tech on board.

If You Build It, They will Come - IoT Driven Botnet Attacks

If You Build It, They Will Come - IoT Driven Botnet Attacks

Regardless of term, or use case, it’s well-known that cybercriminals can hack into any vulnerable device connected to the internet to remotely take control of that device and enslave it into a botnet that is part of a distributed denial-of-service (DDoS) attack.

Reports of Potential Data Breach at Saks Fifth Ave

Reports of Potential Data Breach at Saks Fifth Ave

Over the weekend, Saks Fifth Ave reported that customers’ data may be exposed.

FBI Director: No Evidence of Wiretap

FBI Director: No Evidence of Wiretap

In a hearing with the Intelligence Committee, FBI Director James Comey said there was no evidence to support President Trump’s tweets claiming Trump Tower was wiretapped by former President Obama.

Why is the Security Industry Failing?

Why is the Security Industry Failing?

We have failed to focus on what’s most important: building security in.

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung will finally offer monthly security updates.

Stopping the Post-EMV Surge in Online Fraud

Stopping the Post-EMV Surge in Online Fraud

The predicted increase in online fraud in the U.S. has arrived with the adoption of chip card technology.



Brivo Announces Partnership with Mercury Security

Brivo Announces Partnership with Mercury Security To Support An Open Hardware Platform for its Access Control Solution

4 Charged in Yahoo Data Breach

4 Charged in Yahoo Data Breach

Four people, including two officers from Russian security services, were charged by the U.S. in the massive data breach that plagued Yahoo.

Homeland Security Finds Human Vetting More Effective than Computers

Homeland Security Finds Human Vetting More Effective than Computers

Report finds scanning social media accounts is best done by humans.

Panel of Industry Execs to Discuss the Impact of the IoT at ISC West 2017

Panel to Address Benefits and Downside of Technologies Driving Networked Systems

Protests after Release of New Michael Brown Surveillance Footage

Protests after Release of New Michael Brown Surveillance Footage

New video shows Michael Brown at the convenience store police say he robbed hours before he died.

White House Breach

White House Breach

Intruder breaches White House grounds and was arrested near residence entrance.

Several Injured in German Train Station Axe Attack

Several Injured in German Train Station Axe Attack

Several people were injured by a man with an axe on Thursday night in Germany.

Hanwha Techwin Debuts New Website

Hanwha Techwin America is introducing their advanced web site.

FCC Investigating Nationwide 911 Outage for AT&T Users

FCC Investigating Nationwide 911 Outage for AT&T Users

Users of AT&T’s wireless network found themselves without the ability to call 911 last night.

Ransomware Rundown: What Businesses Need to Know

Ransomware Rundown: What Businesses Need to Know

Today as the cybersecurity landscape continues to evolve at breakneck speed, so do the threats, and the amount of data we have sitting with the different organizations we deal with is growing each day.

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks released thousands of documents that it said described hacking methods of the CIA.

Senate Calls for Increased Security as Threats on Jewish Centers Rise

Jewish Community Centers around the U.S. faced another wave of bomb threats on Tuesday.

Security Services Prevented 13 UK Terrorist Attacks since 2013

Security Services Prevented 13 UK Terrorist Attacks since 2013

UK’s Senior Counter-terrorism police officer said UK security services have stopped 13 terror attacks since 2013.

Pivot3 Names Mark Maisano as Vice President of Channel Sales

Maisano brings over 15 years of channel expertise, delivering record-setting sales and revenue growth in competitive markets for companies like Acronis, Ingram Micro and Seagate Technology.

Westinghouse Security Adds Starlight Color Camera Series to Lineup

Westinghouse Security Adds Starlight Color Camera Series to Lineup

ISONAS Kicks Off New Year with the Release of Pure Access 2.0 Software Platform

Leading Colorado-based access control manufacturer brings new features to its Pure Access Software to better serve customers

Bosch Security Systems drives forward its video security business together with Sony

Bosch takes further steps in cooperation with Sony towards setting new standards in the field of video security solutions

Trump Accuses Obama of “Wire Tapping” Trump Tower Phones

Trump Accuses Obama of “Wire Tapping” Trump Tower Phones

Over the weekend, President Trump publicly accused former-president Obama of wiretapping the phones in Trump Tower before the election.

Milestone Systems names Bosch its 2016 Camera Partner of the Year

Milestone Systems names Bosch its 2016 Camera Partner of the Year

Milestone Sets Out to Make the World See

Milestone Sets Out to Make the World See

Milestone Systems is the number one VMS worldwide, but they are searching for more.

Top 5 Countries where Cyber Attacks Originate

Top 5 Countries Where Cyber Attacks Originate

Most countries have fallen victims to traditional style of cyber attacks originating from other countries.

Security Professionals Run for Children at Mission 500's 8th Annual Security 5K/2K at ISC West

Security Professionals Run for Children at Mission 500’s 8th Annual Security 5K/2K at ISC West

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.