Data Security


Preventive Software Bolsters Protection Systems

Exclusively Online: Preventive Software Bolsters Protection Systems

Physical security solutions encompass data-driven knowledge to help anticipate future incidents.

Chinese iPhone Users Targeted in Security Breach

Chinese iPhone Users Targeted in Security Breach

After an attack on the App Store, iPhone and iPad users in China and Taiwan are still at risk.

The Magnetic Center

The Magnetic Center

Success found by taking ideas that seemed like sound concepts and putt them into practice in a scalable way.

iPhone Encryption App Data a Major Flaw in Travel Apps

iPhone Encryption Data a Major Flaw in Travel Apps

A new report from Bluebox Security says the top 10 travel apps in the iOS and Android app stores are all riddled with security flaws. Bluebox says encryption app data, insufficient protection against man-in-the-middle attacks, and leftover administration or debugging code are the biggest issues for the iPhone and Android devices.

Online Exclusive: Complying with Stringent Requirements

Online Exclusive: Complying with Stringent Requirements

Every level of government developing ways to deal with physical security as well as the data their program produce.

Search Warrant Required Before Using Secretive Cellphone Surveillance

Search Warrant Required Before Using Secretive Cellphone Surveillance

First effort to create uniform legal standards for federal authorities to track cellphones.

Security Flaw puts WhatsApp Users at Risk

Security Flaw puts WhatsApp Users at Risk

The flaw could affect up to 200 million users.

Top Baby Monitors Lack Basic Security Features

Top Baby Monitors Lack Basic Security Features

A new report says some of the top baby monitors are vulnerable to basic hacking attempts.



Reducing opportunity for catastrophic compromised data

Securing Your Cloud

Cloud computing offers numerous benefits, such as powerful processing capabilities, improved access, higher availability and significant savings with on-demand hosting.

Secure Hosted Technology

Secure Hosted Technology

From data breaches to security system compromises, there’s a ‘cloud’ hanging over hosted environments, labeling them unsafe or subject to easy compromise.

GTL Includes Key-injected Credit Card Scanners

Updates kiosk inspection protocol to ensure customer data safety.

Absolute Collaborates with AMD to Extend Benefits of Persistence Technology

Technology embedded into core of devices at factory and provides reliable two-way connection.

Uber to Strengthen Data Security

Uber to Strengthen Data Security

The ride service is significantly expanding its security team.

Absolute Collaborates with RSA to Offer Enhanced Endpoint Data Collection & Remediation

Collaboration supports and is designed to deliver seamless interoperability.

Code Dx and Checkmarx Partner to Enhance Software Security

Partnership enables organizations to easily scan code and eliminate software risk.

Virtual and Physical Security Collide to Dominate Data Center Security

Virtual and Physical Security Collide to Dominate Data Center Security

Security market to see rise of opportunities in cloud data center security.

Chinese Cyberspies Raid Personal Inboxes of U.S. Government Officials

Chinese Cyberspies Raid Personal Inboxes of U.S. Government Officials

Since 2010 high-ranking officials' vacation plans, emails to friends and other correspondence has been targeted by China.

Zetron and CS-Solutions Partner to Enhance the Cybersecurity of Mission-critical Operations

New partnership helps ensure data integrity and operational continuity if a cyber-incident occurs.

Hackers Working at Top Speed to Gain Entry into Your Car and Home

Hackers Working at Top Speed to Gain Entry into Your Car and Home

Small $30 device - Rolljam - enables entry into two of your most private places.

MKS Announces Integration with Cloud-based Services from Bosch Security Systems

Enables monitoring centers to leverage cloud services, including Video Verification, 24/7 Live Intervention, Virtual Guard, Virtual Escort, and Virtual Assistant.

Featured

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.