Data Security


Stopping the Post-EMV Surge in Online Fraud

Stopping the Post-EMV Surge in Online Fraud

The predicted increase in online fraud in the U.S. has arrived with the adoption of chip card technology.

4 Charged in Yahoo Data Breach

4 Charged in Yahoo Data Breach

Four people, including two officers from Russian security services, were charged by the U.S. in the massive data breach that plagued Yahoo.

Ransomware Rundown: What Businesses Need to Know

Ransomware Rundown: What Businesses Need to Know

Today as the cybersecurity landscape continues to evolve at breakneck speed, so do the threats, and the amount of data we have sitting with the different organizations we deal with is growing each day.

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks released thousands of documents that it said described hacking methods of the CIA.

Trump Accuses Obama of “Wire Tapping” Trump Tower Phones

Trump Accuses Obama of “Wire Tapping” Trump Tower Phones

Over the weekend, President Trump publicly accused former-president Obama of wiretapping the phones in Trump Tower before the election.

Mobile-first Experiences

Lifestyle Communities | LC is a niche, residential real estate development and asset management company focused on serving the specific needs of its residents through the thoughtful integration of living, entertainment and socially-focused ventures.

Cloudflare Bug Leak Puts Corporate Companies at Risk

Cloudflare Bug Puts Corporate Companies at Risk

Software bug at an internet-service provider sparks privacy and security concerns.

Hacker Tells POTUS to Change Twitter Security Settings

Hacker Tells POTUS to Change Twitter Security Settings

A hacker just wants President Trump to change his security settings on Twitter.



Trump Choses Rudy Giuliani to Meet with Companies on Cybersecurity

Trump Picks Rudy Giuliani to Meet with Companies on Cybersecurity

President-Elect chooses Rudy Giuliani to hold private industry meetings on cybersecurity.

2017: The Year Encryption Goes Wild

2017: The Year Encryption Goes Wild

Maybe it’s time for a different (and maybe more affordably efficient) approach.

Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security Firm Predicts the Internet Will Shut Down for 24 Hours in 2017

Security firm LogRhythm has predicted the internet will shut down for 24 hours in 2017 due to a massive DDoS attack.

Biggest Security Incidents of 2016

Biggest Security Incidents of 2016

Vehicle attacks, hacks and police ambushes make the list of top physical security events of 2016.

Guide for Protecting your Company against Insider Threats

Guide for Protecting your Company against Insider Threats

Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.

2017 Encryption Landscape

2017 Encryption Landscape

There is a growing belief that 2017 will be a decisive year in the battle over encryption that has been quietly raging for over 25 years.

Yahoo Hacked… Again

Yahoo Hacked... Again

Yahoo said 1 billion accounts were affected in the 2013 hack.

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics Hack Leaves the Data of 34,000 Patients Exposed

Quest Diagnostics' mobile application was hacked leaving the health information of about 34,000 people vulnerable.

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Netgear Warns Routers have Easily Exploitable Security Vulnerability

Several routers, including those in the popular “Nighthawk” series, are affected.

Best Practices for Securing Documents

Best Practices for Securing Documents

Exploring basic best practices for securing documents on your computer and smartphone

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Online Exclusive: Building Security Management: Is the Cloud a Viable Option?

Now, the understanding of cloud technology and its value are clear, but safety often comes into question for security professionals.

Facebook Isn

Online Exclusive: Facebook Isn't Safe!

Close the door on Locky ransomware infection via Facebook

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.