CyberSecurity


Path to the Future

Path to the Future

Security professionals face many challenges in selecting video surveillance systems that address their unique needs.



voting booth in 2016

Government Officials Worry That Ransomware Attacks Could Derail 2020 Elections

The Department of Homeland Security is preparing to launch an education program on the potential of ransomware attacks targeting voter databases, some of which were compromised by Russian hackers in 2016.

cyber attack written on newspaper

Report: Insurance Companies Are Exacerbating Rise in Ransomware Attacks

A ProPublica investigation found that the decision by insurers to pay hackers instead of encouraging victims to recover files by themselves is helping fuel a surge in ransomware.

department of homeland security flag

Federal Cybersecurity Agency Prioritizes Addressing Chinese Threats, Improving Election Security

The leader of the Cybersecurity and Infrastructure Agency, which works within DHS, is concerned primarily with risk management, Chinese threats to supply chains and election security.

department of justice

Justice Department Indicts 80 People in Massive Online Fraud and Money Laundering Scheme

Two Nigerian citizens are accused of leading a massive fraud scheme that transferred at least $6 million in fraudulently-obtained funds, much of whom was taken from elderly people.

laptop cybersecurity

Five Surprising Trends in Cybersecurity

The impact of GDPR, the increasing number of issues with shadow IT and the more advanced solutions for IoT devices are among the most surprising trends.

medical devices

Healthcare Industry Facing Growing Range of Cyber Threats From Hackers, Foreign Countries

A new report predicts a new frontier of cyber attacks for healthcare organizations, including ransomware, international espionage and the hacking of biomedical devices.

computer keyboard

With 4.1 Billion Records Exposed in Six Months, 2019 Is On Course To Be Record Year For Data Breaches

Only eight breaches were responsible for the exposure of 3.2 billion records in the first half of the year, according to new research.

texas capitol building

Ransomware Attacks Hit 23 Texas Towns, Prompting Statewide Response

The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”

open source vulnerability hacking

The Dangers of Open-Source Vulnerabilities, and What You Can Do About It

Neglecting basic security practices exposes companies to long-standing security threats.

capital one building

Alleged Capital One Hacker Stole From More Than 30 Other Organizations, Prosecutors Say

In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.

secure tablet

How Deception Technology Can Help You Detect Threats Early

Deploying automated decoys can help protect your network and reduce IT costs.

Rebuilding Trust After Cybersecurity Lapses

Rebuilding Trust After Cybersecurity Lapses

Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.

wifi router office

IoT Security: Current Threats and How to Overcome Them

Connecting devices to a 0G network is a simple fix to seemingly insurmountable challenges.

DHS Warns of ‘Tragedy-Related Scams’ After El Paso and Dayton Shootings

DHS Warns of ‘Tragedy-Related Scams’ After El Paso and Dayton Shootings

A Homeland Security agency and the FBI’s El Paso office are cautioning Americans to watch out for malicious "charity" emails and phone call scams.

cisco systems

Cisco Agrees to Pay Over $8 Million For Selling Video Surveillance System with Technical Flaws

Experts believe Cisco’s payout to a whistleblower could set a precedent for future lawsuits against vendors who sell products with security vulnerabilities.

Pelco Provides Meaningful Cybersecurity

At the Cyber:Secured Forum in Dallas, two Pelco employees broke down the "culture shift" from physical to cyber issues in the security industry.

Overcoming the Challenges of SecOps Implementation

Overcoming the Challenges of SecOps Implementation

Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.

Featured

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.