Data Security


Secure Storage in the Age of Edge Computing and the Cloud

Secure Storage in the Age of Edge Computing and the Cloud

Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.

Looking Beyond the Hype

Looking Beyond the Hype

The past few years have seen significant advancements in computing power. With this, machines seem to have a greater ability to learn about us and participate in our lives.

Are You Throwing Money Away

Are You Throwing Money Away

Millions of video surveillance cameras around the world are losing money.

The Year of the Cloud

People are always trying to predict industry trends, but virtually all of the predicted trends I have read lately are just a subset of the benefits offered by cloud managed video.

Security Flaws Already Found in 5G Technology

Security Flaws Already Found in 5G Technology

5G is the talk of the town, but is it free of security risks?

Military File-Sharing Site Brought Back Online Following Security Concerns

Military File-Sharing Site Brought Back Online Following Security Concerns

The Defense Department website used to transfer large files containing sensitive unclassified information was brought back online earlier this month after being taken down due to security concerns last year.

New Report Shows 550 Percent Increase in Consumer Security Risks Connected to Apps

New Report Shows 550 Percent Increase in Consumer Security Risks Connected to Apps

McAfee's Mobile Threat Report found that reporting backdoors, malicious cryptomining, fake apps and banking Trojans all increased substantially in 2018.

Reverse Engineering is One of Your Best Weapons in the Fight Against Cyberattacks

Reverse Engineering is One of Your Best Weapons in the Fight Against Cyberattacks

Reverse engineering is a powerful tool to keep in your cybersecurity tool belt.



California Introduces New Bill to Enhance Data Breach Notification Laws

California Introduces New Bill to Enhance Data Breach Notification Laws

California already has some of the strongest data breach laws in the U.S., but thinks it can do better.

Senate Intelligence Committee Questions Healthcare Cybersecurity

Senate Intelligence Committee Questions Healthcare Cybersecurity

Democrat Senator Mark Warner is asking healthcare organizations how the Senate Intelligence Committee can aid in beefing up cybersecurity laws.

Major Security Flaws Found in Popular Password Managers

Major Security Flaws Found in Popular Password Managers

Independent Security Evaluators found some worrying flaws in popular password managers, but still suggest that you use one.

Nearly 50,000 AdventHealth Patients Impacted in Yearlong Data Breach

Nearly 50,000 AdventHealth Patients Impacted in Yearlong Data Breach

AdventHealth's system was breached for over a year, impacting 42,000 patients and their data.

Identity In A Zero Trust World

Identity In A Zero Trust World

Our solutions must continually validate the identity of the person accessing our applications and data.

Nearly 15 Million 500px Users Made Vulnerable by Breach

Nearly 15 Million 500px Users Made Vulnerable by Breach

The names, usernames, passwords and other sensitive information was leaked in July of 2018.

Two Dating Apps Under Fire for Security Issues

Two Dating Apps Under Fire for Security Issues

Two dating apps have come under fire lately for security problems—Ok Cupid for a potential data breach and Jack’d for a vulnerability that left private photos potentially exposed.

The 3 Greatest Valentine

The 3 Greatest Valentine's Day Cyber Threats

Valentine’s Day is a boon to restaurants, retailers, flower shops, online dating sites – and cyber hackers.

Almost 60,000 Data Breaches Reported Since GDPR Implementation

Almost 60,000 Data Breaches Reported Since GDPR Implementation

More than 59,000 data breaches have been reported across Europe since the General Data Protection Regulation (GDPR) came into full effect, according to law firm DLA Piper.

Investigation Finds Telecom Companies Sold Sensitive Customer GPS Data

Investigation Finds Telecom Companies Sold Sensitive Customer GPS Data

An investigation by Motherboard has found that an estimated 250 bounty hunters and related businesses had access to customer location data from AT&T, T-Mobile and Sprint.

Apple Tells App Developers to Disclose or Remove Screen Recording Code

Apple Tells App Developers to Disclose or Remove Screen Recording Code

Apple is telling app developers to either remove or properly disclose to users their use of code that allows them to record the way a user interacts with their iPhone apps—or face removal from the app store.

How to Recover from a Ransomware Attack

How to Recover from a Ransomware Attack

Having the right cybersecurity solutions in place now will go a long way toward helping you recover from a ransomware attack later.

Featured

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.