CyberSecurity


Houston Astros

Houston Astros' Ground Control System Hacked, Possibly by Rival Team

Network contained internal discussions about trades, proprietary statistics and scouting reports.



LUCY Data Security Solution Acts as “Crash Test Dummy” to Emulate Cyberattacks

Helps find security weakest links to prevent phishing, malware and drive-by attacks.

New Exabeam User Behavior Analytics Software Release

Additional features in Exabeam Version 1.7 combine behavior analytics, data science and machine learning to empower customers with tools and context needed to thwart cyberattacks.

China Hacking Exposes Millions of U.S. Workers

China Hacking Exposes Millions of U.S. Workers

The Obama administration a breach on government workers could affect up to four million citizens.

Facebook Baits Users with Security Checkup

Facebook Baits Users with Security Checkup

Company provides security features and tools to empower individual account users.

First Online Security Game Launched to Help Educate and Raise Awareness

IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.

Rating a Company

Rating a Company's Security Effectiveness

Tallying the number of alerts and breaches doesn't tell the whole story.

Password Recovery Questions are a Terrible Way to Protect Online Accounts

Password Recovery Questions are a Terrible Way to Protect Online Accounts

A new research paper found that people often choose obvious answers that are easy for hackers to guess.

United Airlines Will Pay Bug Hunters in Air Miles

United Airlines Will Pay Bug Hunters in Air Miles

The airline will pay a maximum of one million miles to anyone who can prove a remote code execution.

Survey Shows Millennials Represent Greatest Risk to Corporate Data

Absolute Software report uncovers usage behavior and security risks of connected employees.

Intercede Teams Up with Citrix to Deliver Strong Authentication

MyID technology allows customers to sign and encrypt email from mobile devices securely using WorxMail.

Hackers Have Figured Out How to Steal from Starbucks Cards

Hackers Have Figured Out How to Steal from Starbucks Cards

Users who have auto-reload setup on their digital card might be vulnerable.

Hard Rock

Hard Rock Reports Security Breach

The hotel & casino says hackers may have access to information about credit and debit cards.

Should Nuclear Missiles be on High Alert

Should Nuclear Missiles be on 'High Alert?'

Hopefully, hackers have heart not to launch nuclear weapons.

EU Officials Call for Major Security Changes

EU Officials Call for Major Security Changes

The changes would be made to confront new security risks in many different areas.

Verizon Data Breach Study Finds Olds Flaws Still Dangerous

Verizon Data Breach Study Finds Olds Flaws Still Dangerous

The 2015 edition of the DBIR provides insight into the state of cyber-security in 2014.

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

Online Exclusive: ‘Integrated Security’ – Not Just an Industry Buzzword

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

White House Computers are Vulnerable to Hackers

White House Computers are Vulnerable to Hackers

An official has stated that unclassified computers at the White House are vulnerable.

Vidsys Innovates Software Platform

Convergence of physical and cybersecurity along with information management solutions.

More Than 26,000 Twitter Accounts Linked to ISIS

More Than 26,000 Twitter Accounts Linked to ISIS

A cybersecurity activist developed the roster, but it has flaws.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.