Data Security


MKS Announces Integration with Cloud-based Services from Bosch Security Systems

Enables monitoring centers to leverage cloud services, including Video Verification, 24/7 Live Intervention, Virtual Guard, Virtual Escort, and Virtual Assistant.

Promisec Partners with TD Azlan

To deliver agentless endpoint security to French market.

OnSSI Certifies New Ocularis 5.0 Integrations with C2P

Provides common video interface for a wide range of vertical market applications.

Security Companies Develop Real-time Maps of Cyberattacks

Security Companies Develop Real-time Maps of Cyberattacks

Recent hacks expose personal information about millions of people.

Wired Lists the Windows 10 Security Settings worth Knowing

Wired Lists the Windows 10 Security Settings worth Knowing

Windows 10 features a number of security updates and settings that are important to know, even if you didn’t read the fine print.

Public Wi-Fi Users Neglect Security Precautions

Public Wi-Fi Users Neglect Security Precautions

Some public Wi-Fi hotspots are provided by con artists.

Part 7: Refocus on the Glide Path

Part 7: Refocus on the Glide Path

Intersecting business into the professionalization of information security debate.

Zscaler Raises $100M in Funding

Zscaler Raises 100M in Funding

The funding was led by TPG Growth.



Part 6: Taking Control of the Stick

Part 6: Taking Control of the Stick

5 steps to help professionalize the cybersecurity workforce.

Part 5: Wake the Flight Crew

Part 5: Wake the Flight Crew

Five key areas of understanding for information security directors.

Pay Now or Pay Later

Part 4: Pay Now or Pay Later

Breaches of all sizes - small, medium and large - ruin reputations and can cost millions of dollars.

Back to the Future

Part 3: Back to the Future

Bolting on security after the fact is always more costly, time consuming and less effective.

Android Security Flaw Leaves 950 Million Phones Vulnerable

Android Security Flaw Leaves 950 Million Phones Vulnerable

The devices can be hacked using a simple MMS message.

Online Exclusive Series Part 2: A Glimmer of Hope

Online Exclusive Series Part 2: A Glimmer of Hope

International Information Systems Security Certification Consortium of 1988 formed among several professional organizations to create a global information security certification process for professionals and address the need for standardized curriculum.

Online Exclusive Series Part 1: In the Beginning

Online Exclusive Series Part 1: In the Beginning

What does information security have in common with Eastern Air Lines Flight 401? It’s an odd question, with an important — and potentially tragic — answer.

Code Dx Expands Reseller Program with Addition of CM-Logic

Partnership will expand reach for Code Dx's software vulnerability management system to Europe.

Google Disables Flash Due to Security Concerns

Google Disables Flash Due to Security Concerns

Mozilla also disabled the web-enabled video software.

21 Million Social Security Numbers Stolen in Second OPM Data Breach

21 Million Social Security Numbers Stolen in Second OPM Data Breach

Credit monitoring and identity-theft protection offered to those affected.

How Colleges and Universities Defend Against Cyber Threats

How Colleges and Universities Defend Against Cyber Threats

Take into consideration the hackers' motivation, then develop a plan of action.

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Increasing mobility of equipment raises new concerns of managing access and keeping data confidential.

Featured

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.