CyberSecurity


Security Strategy

Security Strategy

While many security teams at retailers are concerned about the potential for a big data breach, everyday security threats, like social engineering and shoplifting, are heightened in a world of omni-channel retail.



Data Secure

The risk posed by hackers to the Internet of Things (IoT) is a hot topic and there have already been some serious real-world attacks.

Not a Catch-all

Not a Catch-all

When used effectively, biometrics can contribute to safer cybersecurity practices.

Chipotle Releases Nationwide List of Breached Stores

Chipotle Releases Nationwide List of Breached Stores

Chipotle has released a nationwide list of stores that were targeted in the security breach between March and April of 2017.

China to Launch Controversial Cybersecurity Law This Week

China to Launch Controversial Cybersecurity Law This Week

Companies are asking China to delay the implementation of a new cybersecurity law amid concerns of how the legislation will affect personal information and cloud computing.

How to Protect Yourself From WannaCry

How to Protect Yourself From WannaCry

The WannaCry attack started last Friday and has affected 200,000 computers in almost 150 countries around the world.

More Victims Expected in Worldwide Cyberattack

More Victims Expected in Worldwide Cyber Attack

Cybersecurity experts expect there will be more people falling victim to the worldwide cyberattack that hit on Friday.

UK Hospitals Report Cyber Attack

UK Hospitals Report Cyber Attack

Several British Hospitals say they are experiencing major computer problems as the result of a breach in cybersecurity.

President Trump Signs Cybersecurity Executive Order

President Trump Signs Cybersecurity Executive Order

President Trump has signed an executive order to strengthen the government’s cybersecurity.

French Presidential Campaign Sees Breach Similar to Hack that Plagued American Election

French Presidential Campaign Sees Breach Similar to Hack that Plagued American Election

Just days ahead of the French Presidential Election, candidate and now France’s president-elect announced his campaign had been hacked.

World Password Day: Fact or Fiction

World Password Day: Fact or Fiction

It’s time to take the pledge to improve your password habits.

Google Docs Hit by Phishing Attack

Google Docs Hit by Phishing Attack

Don't edit that Google Doc, at least not today.

Layered Approach

Layered Approach

The IT approach to layered security for systems, infrastructure and data is increasingly impacting the security department, and with good reason.

Grant Management

In Kaua’i County, Hawaii, grants management has long been an important part of local government operations. It’s also been handled using paper.

Not a Catch-all

Not a Catch-all

While the technology can add an effective, additional layer of cybersecurity, it’s not a catch-all. In fact, the very nature of biometric technology can introduce additional security gaps.

Chipotle Reveals Potential Breach in Data Security

Chipotle Reveals Potential Breach in Data Security

Chipotle customers may have more to complain about than just an extra cost for guacamole.

Uber Can Track Devices, Even After You Delete the App

Uber Can Track Devices, Even After You Delete the App

Uber knows where to find you even if you do delete the app.

Why Protecting Your Tax Data Is More Important than Ever

Why Protecting Your Tax Data Is More Important than Ever

In recent years a disturbing new trend is on the rise – cybercrime relating to tax returns and tax-related data. For its victims, Tax Day represents inconvenience and loss.

DDoS downfall: How the IoT is Becoming the Internet of Very Bad Things

DDoS Downfall: How the IoT is Becoming the Internet of Very Bad Things

This age of connectivity is the age of possibility, and millions of people all over the world are taking advantage of the wonderful benefits these devices have to offer.

How to Operationalize Security with Enterprise Wide Engagement

How to Operationalize Security with Enterprise-Wide Engagement

How to Prevent Breaches, Not Just Clean Up the Mess

Featured

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.