CyberSecurity


Surveillance Drones Easily Hacked

Surveillance Drones Easily Hacked

Researchers say that police drones used for surveillance can be hacked with a rather inexpensive kit.



Cyber Impact

Cyber Impact

Today’s retail banks are nothing like they were in your grandfather’s day. Back then customers conducted all their banking business in a physical branch.

CLOUD-BASED SOLUTION

Cloud-based Solution

Even though the security industry has been talking about the concept of “The Cloud” for a number of years, the industry has been slow to capitalize on the capabilities and power of the platform on a widespread basis.

A Child Tracker Website, uKnowKids, Admits Data Breach

Child Tracker Website, uKnowKids, Admits Data Breach

A website that contains information about children in case they go missing has admitted a glaring security hole that leaves the data of over 1,500 children exposed.

Having the best, most accessible technical support team will ensure the safety and security of not only your data and staff, but will be an added benefit to your company’s long-term bottom line, as well.

Online Exclusive: Top 4 Security Installation Mistakes to Avoid

Having the best, most accessible technical support team will ensure the safety and security of not only your data and staff, but will be an added benefit to your company’s long-term bottom line, as well.

MasterCard Unveils New ‘Selfie’ Security Check

MasterCard Unveils New ‘Selfie’ Security Check

MasterCard announced new security measures for mobile smartphones and tablets.

Apple Urges U.S. to Form Encryption Commission

Apple Urges U.S. to Form Encryption Commission

The company asked the government to create a panel to help resolve a standoff over national security.

Annual Assessment Outlines the Greatest Security Threats Facing the U.S.

Annual Assessment Outlines the Greatest Security Threats Facing the U.S.

Director of National Intelligence speaks about which security threats the United States should be prepared for.

Data Breach: 63,000 Social Security Numbers Compromised at University

Data Breach: 63,000 Social Security Numbers Compromised at University

The University of Central Florida is investigating a data breach that left 63,000 Social Security numbers vulnerable.

DropBox, Gmail Logins Acquired in Security Camera Hack

DropBox, Gmail Logins Acquired in Security Camera Hack

Researchers find the Motorola Focus 73 security camera to have a pretty big vulnerability.

Is your Bank Teller your Biggest Threat?

Is your Bank Teller your Biggest Threat?

Bank robbers aren’t the only ones that will demand cash from your accounts.

Facebook Bans Private Gun Sales on Its Site

Facebook Bans Private Gun Sales on Its Site

Facebook announces they will be banning private gun sales on its site, a move meant to clamp down on unlicensed gun transactions.

Where Video Data Will Take Us - Successful companies read the tea leaves and saw IoT-connected devices coming. This includes video surveillance, which is now among the fastest growing industries in terms of data generation and adoption of new data storage technologies.

Where Video Data Will Take Us

Successful companies read the tea leaves and saw IoT-connected devices coming. This includes video surveillance, which is now among the fastest growing industries in terms of data generation and adoption of new data storage technologies.

It

It's All About the Network

The daily increase in the number of cyber attacks launched and the success hackers are having against heavily guarded businesses are a wake-up call for all companies to be more proactive and vigilant in their security efforts.

Top Fraud Risks for Financial Institutions in 2016

5 Top Fraud Risks for Financial Institutions in 2016

All in all, cyberattacks will continue to menace financial institutions in 2016.

3 Strategies for Ensuring Your Payment Platforms Are Secure

Online Exclusive: 3 Strategies for Ensuring Your Payment Platforms Are Secure

Consumers may think data breaches are inevitable, but if a business can show them that such risks are avoidable, it’s sure to profit. Don’t get left behind by your competitors—invest in a robust payment-protection platform before it’s too late.

Hackers could be Secretly Tapping into your Corporate Meetings

Hackers could be Secretly Tapping into your Corporate Meetings

Lots of companies, even the White House, use a conference calling system that could possibly be tapped by hackers, according to new research.

Your Smartwatch Could Be your Biggest Security Threat

Your Smartwatch Could Be Your Biggest Security Threat

A student discovered that wearable technology could lead to stolen ATM pin codes.

Security Flaw Found in New “Must-Have” Star Wars Toy

Security Flaw Found in New “Must-Have” Star Wars Toy

A security research company has found easy it is to bring BB-8 to the dark side.

Websites and Apps Have One Year to Adhere to New Security Measures

Websites and apps have been given the deadline of January 1, 2017 to adhere to new security standards to minimize the risk of hacking and prevent a “mini-Y2K,” or have access to their websites taken away.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.