Data Security


2017: The Year Encryption Goes Wild

2017: The Year Encryption Goes Wild

Maybe it’s time for a different (and maybe more affordably efficient) approach.

Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security firm LogRhythm has predicted the internet will shut down for 24 hours in 2017 due to a massive DDoS attack.

Biggest Security Incidents of 2016

Biggest Security Incidents of 2016

Vehicle attacks, hacks and police ambushes make the list of top physical security events of 2016.

Guide for Protecting your Company against Insider Threats

Guide for Protecting your Company against Insider Threats

Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.

2017 Encryption Landscape

2017 Encryption Landscape

There is a growing belief that 2017 will be a decisive year in the battle over encryption that has been quietly raging for over 25 years.

Yahoo Hacked… Again

Yahoo Hacked... Again

Yahoo said 1 billion accounts were affected in the 2013 hack.

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics' mobile application was hacked leaving the health information of about 34,000 people vulnerable.

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Several routers, including those in the popular “Nighthawk” series, are affected.



Best Practices for Securing Documents

Best Practices for Securing Documents

Exploring basic best practices for securing documents on your computer and smartphone

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Now, the understanding of cloud technology and its value are clear, but safety often comes into question for security professionals.

Facebook Isn

Online Exclusive: Facebook Isn't Safe!

Close the door on Locky ransomware infection via Facebook

Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Online Exclusive: Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Leveraging artificial intelligence and machine learning allows organizations to enjoy real time protection and risk identification, significantly reducing security risks without the need to increase staff.

Snowden Leak Caused ‘Tremendous’ Damage to U.S. Security

Snowden Leak Caused 'Tremendous Damage' to U.S. Security

A U.S. House committee issued a scathing report accusing Snowden of causing damage to U.S. security.

3 Ways iOS 10 Brings Security to Your iPhone

3 Ways iOS 10 Brings Security to Your iPhone

The top iPhone features that guard your privacy and security.

4 Critical Components of Tomorrow’s Cyber Security Incident Response

4 Critical Components of Tomorrow's Cyber Security Incident Response

Each of these four key components are essential in establishing a solid defense against would-be cyber-attacks.

Intel Open to Selling Security Software Business

Intel Open to Selling Security Software Business

Intel could never make full use of the McAfee business, which it bought in 2010.

Dave Larson, COO of Corero Network Security, discusses DDoS attacks.

Online Exclusive: DDoS Attacks Fuel the Need for Modern Protection Methods

DDoS attack prevention is nearly impossible: it’s difficult to track down hackers, whereas it’s easy and inexpensive to launch a DDoS attack.

Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.

Thousands of Credit Cards Stolen from Acer Online Store

Thousands of Credit Cards Stolen from Acer Online Store

Acer has admitted to a data breach that affects more than 30,000 customers.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

Featured

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.