CyberSecurity


More than a byte

More than a Byte

Cybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks.



Accelerating Detection and Response

Last spring, in late March, regional grocer Schnucks Markets reported that the credit card data of more than 2 million customers was stolen by cybercriminals.

On The Fast Track

On the Fast Track

Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.

kolbye thumbnail

FBI Special Agent Discusses Counterterrorism at GovSec West 2013

Kevin Kolbye, as assistant special agent in charge of the FBI’s Dallas office, spoke about the FBI’s counterterrorism efforts.

Solution to Keep the US Government from Snooping

Solution to Keep the US Government from Snooping

Solutions that generate crypto keys may be the answer.

5 Things to Do Before 8AM to Protect Yourself Online

5 Things to Do Before 8AM to Protect Yourself Online

Grab your cup of coffee, and take 5 minutes to make sure you stay safe online!

Putting PIV Cards to Practical Use

Putting PIV Cards to Practical Use

The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount.

HID Global and Consortium Partners Receive US Cyber Security Grant

HID Global and Consortium Partners Receive US Cyber Security Grant

Grant valued at more than $1.5 million is one of four being awarded this year through the National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative.

Best Practices for Companies to Maintain Control of Sensitive Data

Best Practices for Companies to Maintain Control of Sensitive Data

A world saturated with digital data needs assurance that this data won't fall into the wrong hands.

Top 3 Internet Security Myths

Top 3 Internet Security Myths

Methodical approach and identifying the right tools to meet individual needs is key to security against cyber threats.

Clicking Through the Cloudy Relationship Between US Feds and Google

Clicking Through the Cloudy Relationship Between US Feds and Google

Data from Google scanning can be used for more than just targeting advertising, though what Google might be doing with private information is currently under seal.

Cyber Security Threats Part of ATTs New Launch

Cyber Security Threats Part of ATTs New Launch

Launching expanded set of managed security solutions, new capabilities and the expanding of their cyber security portfolio.

Iran Adds Hacking to Their High School Curriculum

Iran Adds Hacking to Their High School Curriculum

Should a school's curriculum include teaching students how to hack computers?

Featured

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.