Data Security


Dropbox Combats Security Stigma with Enterprise Version of App

Dropbox Combats Security Stigma with Enterprise Version of App

Dropbox creates Enterprise version of app to combat their reputation of being a low security file-sharing platform.

Research Finds 11 High-Impact Security Flaws on Galaxy S6 Edge

Research Finds 11 High-Impact Security Flaws on Galaxy S6 Edge

Google research team finds 11 security flaws on Android device.

Protect Your Data - In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

Protect Your Data

In the minutes, hours and days that follow a widespread, widely publicized data breach, most companies scramble to increase their security measures in an effort to overcompensate for their lack of proactive preparation.

Study Shows Employees are Putting Their Companies at Risk

Study Shows Employees are Putting Their Companies at Risk

Poor security habits from employees could lead to a cybersecurity breach.

SureView Systems Announces New Partnership with Access Technologies

SureView Systems partners with integration firm to create easy-to-use platform for customers.

Cisco Joins with Lancope to Gain Greater Network Security

Cisco Joins with Lancope to Gain Greater Network Security

Cisco's acquisition of Lancope predicted to boost Cisco’s cybersecurity threat defense capabilities.

Why Tech’s Biggest Companies are Against the Cyber Security Bill

Why Tech's Biggest Companies are Against the Cyber Security Bill

Some of technologies leading revolutionaries disregard the Cyber Security Bill as a legitimate solution to the data breaches seen in recent news.

Three Security Questions to ask Cloud Vendors

Three Security Questions to ask Cloud Vendors

There are many concerns when transferring to the cloud and security is one of the biggest, followed closely by concerns about complying with regulations and losing control of data according to a recent study by 451 Research.



Global Mobile Networks are Vulnerable to Security Bugs

Global Mobile Networks are Vulnerable to Security Bugs

A new study shows how mobile networks around the world have been hacked via bugs in the code.

Preventive Software Bolsters Protection Systems

Exclusively Online: Preventive Software Bolsters Protection Systems

Physical security solutions encompass data-driven knowledge to help anticipate future incidents.

Chinese iPhone Users Targeted in Security Breach

Chinese iPhone Users Targeted in Security Breach

After an attack on the App Store, iPhone and iPad users in China and Taiwan are still at risk.

The Magnetic Center

The Magnetic Center

Success found by taking ideas that seemed like sound concepts and putt them into practice in a scalable way.

iPhone Encryption App Data a Major Flaw in Travel Apps

iPhone Encryption Data a Major Flaw in Travel Apps

A new report from Bluebox Security says the top 10 travel apps in the iOS and Android app stores are all riddled with security flaws. Bluebox says encryption app data, insufficient protection against man-in-the-middle attacks, and leftover administration or debugging code are the biggest issues for the iPhone and Android devices.

Online Exclusive: Complying with Stringent Requirements

Online Exclusive: Complying with Stringent Requirements

Every level of government developing ways to deal with physical security as well as the data their program produce.

Search Warrant Required Before Using Secretive Cellphone Surveillance

Search Warrant Required Before Using Secretive Cellphone Surveillance

First effort to create uniform legal standards for federal authorities to track cellphones.

Security Flaw puts WhatsApp Users at Risk

Security Flaw puts WhatsApp Users at Risk

The flaw could affect up to 200 million users.

Top Baby Monitors Lack Basic Security Features

Top Baby Monitors Lack Basic Security Features

A new report says some of the top baby monitors are vulnerable to basic hacking attempts.

Reducing opportunity for catastrophic compromised data

Securing Your Cloud

Cloud computing offers numerous benefits, such as powerful processing capabilities, improved access, higher availability and significant savings with on-demand hosting.

Secure Hosted Technology

Secure Hosted Technology

From data breaches to security system compromises, there’s a ‘cloud’ hanging over hosted environments, labeling them unsafe or subject to easy compromise.

GTL Includes Key-injected Credit Card Scanners

Updates kiosk inspection protocol to ensure customer data safety.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.