CyberSecurity


drone above mountain

Interior Department Grounds Entire Drone Fleet Due to Chinese Cyberattack Concerns

All of the drones used by the department were either manufactured in China or use parts that were made in the country, sparking concerns about potential hacking threats.



Apple building

Major Companies Pledge To Take Steps Toward Building Cybersecurity Workforce

Large employers like Google, Facebook, Johnson & Johnson and Apple have committed to closing the gap of cybersecurity jobs.

jack o lantern

What’s Scarier Than Halloween Night? The Rise of Scammers and Security Breaches in 2019

The horror stories of scammers targeting landline phone numbers and the elderly continue to pile up. Here are the steps that phone companies and governments could take to stop the madness.

Federal Trade Commission

FTC Bans Company From Selling ‘Stalkerware’ Monitoring Apps

Retina-X’s apps posed several security risks to users thanks to lax data protections and loopholes that allowed mobile devices to be monitored without the user’s knowledge.

Ohio Governor Mike DeWine in 2018

Ohio Creates ‘Cyber Reserve’ To Respond to Ransomware Attacks Across State

The reserve will be comprised of volunteer cybersecurity experts who will work with the state national guard to help local governments.

TikTok app

Senators Ask U.S. Intelligence To Investigate Potential Security Risks of TikTok and Chinese-Owned Companies

Chuck Schumer and Tom Cotton sent a letter to the director of national intelligence expressing concerns about ByteDance, which owns the video app TikTok.

data security

How to Prevent Data Loss in 2020

There are several data loss prevention solutions available in the market. Here’s how to tailor those software solutions to your company.

computer at work

Why CEOs of Small Businesses Are Prime Target for Hackers

Cyberattacks are targeting corporations and individuals alike. Here’s how companies can stay more secure on the web.

Capitol Hill at sunset

'Cyber Shield Act’ Aims To Establish Cybersecurity Standards for IoT Devices

The bill, introduced by Democratic legislators on Tuesday, would direct a committee to create security benchmarks and then give labels to products who meet those standards.

using laptop work

Younger Workers More Relaxed About Cybersecurity Than Older Counterparts, Survey Finds

Different generations approach technology at work in vastly different ways, the report found.

Amazon Echo speaker

Researchers: Google and Amazon Smart Speakers Are Vulnerable to Phishing, Eavesdropping Hacks

A group of security researchers found that applications for Google Home and Alexa could be used to obtain passwords and overhear conversations from unsuspecting users.

Senator Ron Wyden of Oregon

Senate Bill Would Impose Steep Fines, Potential Jail Time For Executives Who Violate Data Privacy Rules

Sen. Ron Wyden, a staunch advocate of increased cybersecurity regulations, introduced the legislation as part of an effort to track how companies collect and share customer data.

How These Web Application Security Vulnerabilities Could Be Affecting Your Business

How These Web Application Security Vulnerabilities Could Be Affecting Your Business

When companies don’t follow basic security practices, they leave themselves vulnerable.

pitney bowes building

Shipping Giant Pitney Bowes’ Services Stalled by Ransomware Attack

The company, which serves over 1.5 million clients, has been able to get some services back online but is still working to address the damage.

Incident Response in the Age of Intelligent Bots

Incident Response in the Age of Intelligent Bots

How security teams can improve their defense strategy by integrating bots

Medical Data of 1 Million New Zealanders Potentially Exposed in Health System Breach

Medical Data of 1 Million New Zealanders Potentially Exposed in Health System Breach

The health organization realized during an investigation of an August breach that its systems had been breached several times prior to the known attack.

Study: 66 Percent of Small Businesses Worldwide Have Faced Cyberattacks in The Past Year

Study: 66 Percent of Small Businesses Worldwide Have Faced Cyberattacks in The Past Year

For the third year in a row, SMBs are reporting big increases in the frequency of cybersecurity attacks.

Attorney General Pressures Facebook To Delay End-To-End Encryption, Citing Child Abuse Concerns

Attorney General Pressures Facebook To Delay End-To-End Encryption, Citing Child Abuse Concerns

Law enforcement are increasingly worried about the possibility of end-to-end encryption, which does not provide police with a way to access communications between potential suspects.

Justice Apologizes For Iowa Court System Authorizing Security Vulnerability Testing That Led To Break-Ins

Justice Apologizes For Iowa Court System Authorizing Security Vulnerability Testing That Led To Break-Ins

At a legislative hearing Friday, court administrators answered questions about their decision to hire “penetration testers” who were arrested for burglary last month.

Microsoft: Iranian Hackers Targeted Email Accounts of Presidential Campaign, U.S. Officials

Microsoft: Iranian Hackers Targeted Email Accounts of Presidential Campaign, U.S. Officials

Over 200 accounts were targeted by the group of hackers, but only four were compromised, according to Microsoft.

Featured

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • Allied Universal Report Highlights Expected Security Hazards

    All is not well with the world. I know that is not breaking news. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX
  • Nothing Artificial About this Intelligence

    I have been looking forward to this year’s GSX show in New Orleans, the Cresent City, or if you prefer The Big Easy. It seems like quite a while since we’ve been here. Twenty years ago, ASIS, as it was known then was literally washed out of the city by someone known as Katrina. It is a good thing to come back to NOLA. Read Now

  • From Monitors to Mission Control

    Security Operations Centers (SOC) were once defined by rows of static monitors, each displaying a single feed with operators quietly watching for issues. That model has become obsolete. Incidents evolve too quickly, data comes from multiple locations, and decisions must be made in seconds—not minutes. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.