CyberSecurity


China to Launch Controversial Cybersecurity Law This Week

China to Launch Controversial Cybersecurity Law This Week

Companies are asking China to delay the implementation of a new cybersecurity law amid concerns of how the legislation will affect personal information and cloud computing.



How to Protect Yourself From WannaCry

How to Protect Yourself From WannaCry

The WannaCry attack started last Friday and has affected 200,000 computers in almost 150 countries around the world.

More Victims Expected in Worldwide Cyberattack

More Victims Expected in Worldwide Cyber Attack

Cybersecurity experts expect there will be more people falling victim to the worldwide cyberattack that hit on Friday.

UK Hospitals Report Cyber Attack

UK Hospitals Report Cyber Attack

Several British Hospitals say they are experiencing major computer problems as the result of a breach in cybersecurity.

President Trump Signs Cybersecurity Executive Order

President Trump Signs Cybersecurity Executive Order

President Trump has signed an executive order to strengthen the government’s cybersecurity.

French Presidential Campaign Sees Breach Similar to Hack that Plagued American Election

French Presidential Campaign Sees Breach Similar to Hack that Plagued American Election

Just days ahead of the French Presidential Election, candidate and now France’s president-elect announced his campaign had been hacked.

World Password Day: Fact or Fiction

World Password Day: Fact or Fiction

It’s time to take the pledge to improve your password habits.

Google Docs Hit by Phishing Attack

Google Docs Hit by Phishing Attack

Don't edit that Google Doc, at least not today.

Layered Approach

Layered Approach

The IT approach to layered security for systems, infrastructure and data is increasingly impacting the security department, and with good reason.

Grant Management

In Kaua’i County, Hawaii, grants management has long been an important part of local government operations. It’s also been handled using paper.

Not a Catch-all

Not a Catch-all

While the technology can add an effective, additional layer of cybersecurity, it’s not a catch-all. In fact, the very nature of biometric technology can introduce additional security gaps.

Chipotle Reveals Potential Breach in Data Security

Chipotle Reveals Potential Breach in Data Security

Chipotle customers may have more to complain about than just an extra cost for guacamole.

Uber Can Track Devices, Even After You Delete the App

Uber Can Track Devices, Even After You Delete the App

Uber knows where to find you even if you do delete the app.

Why Protecting Your Tax Data Is More Important than Ever

Why Protecting Your Tax Data Is More Important than Ever

In recent years a disturbing new trend is on the rise – cybercrime relating to tax returns and tax-related data. For its victims, Tax Day represents inconvenience and loss.

DDoS downfall: How the IoT is Becoming the Internet of Very Bad Things

DDoS Downfall: How the IoT is Becoming the Internet of Very Bad Things

This age of connectivity is the age of possibility, and millions of people all over the world are taking advantage of the wonderful benefits these devices have to offer.

How to Operationalize Security with Enterprise Wide Engagement

How to Operationalize Security with Enterprise-Wide Engagement

How to Prevent Breaches, Not Just Clean Up the Mess

Educating End Users

As a provider of storage for video surveillance systems, the hardest part of my job is educating end-users, integrators and consultants on the best way to purchase storage for their systems.

Seriously Cybersecurity Insurance

The thought of a network or individual cameras getting hacked brought cybersecurity into the security picture pretty quickly. Cyber questions also arise when discussing cameras being manufactured in China.

Live From ISC West 2017 Now Available

Live From ISC West 2017 Now Available

The live webpage will frequently update with content from the show floor.

If You Build It, They will Come - IoT Driven Botnet Attacks

If You Build It, They Will Come - IoT Driven Botnet Attacks

Regardless of term, or use case, it’s well-known that cybercriminals can hack into any vulnerable device connected to the internet to remotely take control of that device and enslave it into a botnet that is part of a distributed denial-of-service (DDoS) attack.

Featured

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West
  • New Report Says 1 in 5 SMBs Would Be Forced to Shutter After Successful Cyberattack

    Small and medium-sized businesses (SMBs) play a crucial role in the U.S. economy, making up 99.9% of all businesses and contributing to half of the nation's GDP. However, these vital economic growth drivers face an escalating threat—cyberattacks that could put them out of business. Read Now

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.