CyberSecurity


Worst Data Breaches of 2015

Worst Data Breaches of 2015

It seems all we read about in 2015 was data breaches, data breaches and more data breaches.



Target Wish List App Exposes Users’ Data to a Potential Breach

Target Wish List App Exposes Users' Data to a Potential Breach

Target is back on the naughty list after a tech security company found that users’ data could be pulled from a gift registry app.

Los Angeles Closes All District Schools after Bomb Threat

Los Angeles Closes All District Schools after Bomb Threat

All LAUSD schools were closed after an electronic threat risked the safety of students.

U.S. Looking to Boost Social Media Security

U.S. Looking to Boost Social Media Security

After evidence of attack in San Bernardino was found on social media, the U.S. Department of Homeland Security is looking to boost security on social-networking sites.

Potential Security Risk of Wearable Tech

Potential Security Risks of Wearable Tech

The new, trendy wearable technology could pose a security threat to you.

Patient Data Vulnerable in Hospital Cybersecurity Breach

Patient Data Vulnerable in Hospital Cybersecurity Breach

Middlesex Hospital suffered a data breach that compromised the information of over 900 patients.

Security Vulnerabilities Found in PC Support Software

Security Vulnerabilities Found in PC Support Software

Lenovo, Toshiba and Dell advise users to remove software due to security issues.

Security Breach at Toy Maker Exposes Data on Children

Security Breach at Toy Maker Exposes Data on Children

VTech has been hacked putting the personal information of millions of people, including children, at risk.

Automakers Push Back as Research Shows Car Hacking

Automakers Push Back as Research Shows Car Hacking

To automakers, they are building a world of safer cars, but to data security researchers, they are creating high velocity weapons.

Microsoft Revamps Security Plan

Microsoft Revamps Security Plan

Microsoft plans to invest in new security plan after several high-profile cyber attacks.

Hackers could be Targeting Your Smart TV

Hackers Could Be Targeting Your Smart TV

Avast researchers have found a number of vulnerabilities in Smart TVs.

Panaseer Raises $2.25 Million Seed Investment

Fast-growing cyber security software firm attracts new clients in UK and US.

This Key Industry is Way Behind on Data Security

This Key Industry is Way Behind on Data Security

Despite the growing cyber attacks, the health care industry continues to shortchange Americans when it comes to data security.

3 Charged in Largest-Ever U.S. Bank Data Breach

3 Charged in Largest-Ever U.S. Bank Data Breach

Federal authorities say three people have been charged in the largest theft of consumer data from a U.S. financial institution in history.

Dropbox Combats Security Stigma with Enterprise Version of App

Dropbox Combats Security Stigma with Enterprise Version of App

Dropbox creates Enterprise version of app to combat their reputation of being a low security file-sharing platform.

Taking a Practical Look at Video Storage in the Cloud

Taking a Practical Look at Video Storage in the Cloud

VSaaS solutions have been around for a while now, offering what many see as more efficient software maintenance and support for their surveillance systems.

Majority of Retailers are not using the New Credit Card Technology

Majority of Retailers are not using the New Credit Card Technology

Retailers are deciding not to change over to credit card chip transactions until after the holiday season.

With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.

7 Tips for CEOs Looking to Boost Their Cybersecurity Knowledge

With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.

Persistent Threats

A layered approach to network security is the most reliable way of ensuring peace of mind against Advanced Persistent Threat (APT) forms of cyberattacks because no modern company can afford the surefire method of protection

Protect Your Data - In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

Protect Your Data

In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.