Data Security


Delta Customer Payment Info Potentially Exposed in Cyberattack

Delta Customer Payment Info Potentially Exposed in Cyberattack

Delta has not said how many of its customers were involved in the breach, but Sears Holdings confirmed that as many as 100,000 customers could have been impacted.

Saks, Lord & Taylor: 5 Million Debit and Credit Card Details Stolen

Saks, Lord & Taylor: 5 Million Debit and Credit Card Details Stolen

Card information from charges in-store at Sakes Off 5th and Lord & Taylor have been found vulnerable online.

Under Armor Admits Huge Data Leak in MyFitnessPal App

Under Armor Admits Huge Data Leak in MyFitnessPal App

Under Armor has admitted that nearly 150 million users of the smartphone application "MyFitnessPal" were hacked.

A Privacy Balancing Act

A Privacy Balancing Act

Privacy. It’s gone beyond buzzword into a class of its own: basically, privacy of the individual is of the ultimate importance, and all else must fall away in our efforts to preserve it.

Cyberattack Continues to Plague the City of Atlanta

Cyberattack Continues to Plague the City of Atlanta

It is one of the largest cyberattacks against a major U.S. city.

Facebook Confirms Android Text and Call Histories are Recorded

Facebook Confirms Android Text and Call Histories are Recorded

Users are downloading their Facebook data to see just how much Facebook is recording.

Justice Department Announces Charges in $3.4 Billion Cyber Theft Campaign

Justice Department Announces Charges in $3.4 Billion Cyber Theft Campaign

The cyber theft campaign was targeting American universities, companies and government entities.

Top Online Security Execs Announce Departures

Top Online Security Execs Announce Departures

High-ranking security executives at Google, Facebook and Twitter—three of the Internet’s most important technology companies—have announced this week plans to leave their respective positions.



Teenager Hacks Crypto-Currency Wallet

Teenager Hacks Crypto-Currency Wallet

The teenager ultimately decided to share his findings because he was afraid it would not be explained correctly to customers.

Personal Data of 1.3 Million Shoppers Exposed by Walmart Partner

Personal Data of 1.3 Million Shoppers Exposed by Walmart Partner

According to cybersecurity firm Kromtech, who found it stored in a publicly accessible Amazon S3 bucket.

Google Believes Android is as Secure as iOS Now

Google Believes Android is as Secure as iOS Now

Google released its fourth annual review for Android security. Here are the highlights.

U.S. Power Company Fined $2.7 Million for Security Flaws

U.S. Power Company Fined $2.7 Million for Security Flaws

According to an electronic filing, an unidentified American power company has reached a settlement to pay a $2.7 million penalty over significant security flaws that could have allowed hackers to gain remote access to their systems.

How to Weed the Bad Links Out of Your Inboxes

How to Weed the Bad Links Out of Your Inboxes

Entities need to understand why these attacks are so common and how to combat them.

A Digital Defense Against W-2 Theft

A Digital Defense Against W-2 Theft

The FBI gives basic steps to mitigate the threat of W-2 theft.

GDPR: Here

GDPR: Here's What You Need to Know

The European Union will begin to enforce strict data security starting in May. Here's what you should know.

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity was found to be the top technology used by healthcare facilities.

Users Provide Stronger Passwords If They Can Visualize Password Strength

Users Provide Stronger Passwords If They Can Visualize Password Strength

A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.

Poised for Expansion

Poised for Expansion

Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.

Archiving Security

Archiving Security

The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.

US Border Patrol Unable to Validate E-Passport Data

US Border Patrol Unable to Validate E-Passport Data

E-passports store a cryptographic signature to prevent forgeries and tampering, but CBP has not deployed the software needed to verify the information, causing a security lapse.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.