Data Security


Android Security Flaw Leaves 950 Million Phones Vulnerable

Android Security Flaw Leaves 950 Million Phones Vulnerable

The devices can be hacked using a simple MMS message.

Online Exclusive Series Part 2: A Glimmer of Hope

Online Exclusive Series Part 2: A Glimmer of Hope

International Information Systems Security Certification Consortium of 1988 formed among several professional organizations to create a global information security certification process for professionals and address the need for standardized curriculum.

Online Exclusive Series Part 1: In the Beginning

Online Exclusive Series Part 1: In the Beginning

What does information security have in common with Eastern Air Lines Flight 401? It’s an odd question, with an important — and potentially tragic — answer.

Code Dx Expands Reseller Program with Addition of CM-Logic

Partnership will expand reach for Code Dx's software vulnerability management system to Europe.

Google Disables Flash Due to Security Concerns

Google Disables Flash Due to Security Concerns

Mozilla also disabled the web-enabled video software.

21 Million Social Security Numbers Stolen in Second OPM Data Breach

21 Million Social Security Numbers Stolen in Second OPM Data Breach

Credit monitoring and identity-theft protection offered to those affected.

How Colleges and Universities Defend Against Cyber Threats

How Colleges and Universities Defend Against Cyber Threats

Take into consideration the hackers' motivation, then develop a plan of action.

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Increasing mobility of equipment raises new concerns of managing access and keeping data confidential.



United Airlines Resuming Flights after Computer Glitch

United Airlines Resuming Flights after Computer Glitch

Flights were grounded nationwide due to a network connectivity issue.

Smarter Storage - Benefits drive expansion of IP video systems in Bergen County, N.J.

Smarter Storage

The advantages of video surveillance are well known, but at times, the full value is realized only after a system is installed.

Google Security Researcher Leaves to Take on New Project

Google Security Researcher Leaves to Take on New Project

The researcher known as Mudge plans to start a non-profit devoted to software security.

Safe-T Box 6.0 Secures Data in the Cloud

Unified Secure Data Exchange Broker solution consolidates email, file, mobile and cloud data security.

Facebook Hires Yahoo’s Chief Security Executive

Facebook Hires Yahoo's Chief Security Executive

Alex Stamos starts his new job as the company’s chief security officer.

SureView Systems Announces Integration with PPM

Immix CC Enterprise Command Center Software completes integration with Perspective.

Banks Show Vulnerabilities in Website Security

Banks Show Vulnerabilities in Website Security

Banks such as HSBC and TD Bank are behind the times when it comes to protecting their digital assets.

New Report Puts Samsung Galaxy Users at Risk

New Report Puts Samsung Galaxy Users at Risk

Private information stored on the phone could easily be accessed.

Houston Astros

Houston Astros' Ground Control System Hacked, Possibly by Rival Team

Network contained internal discussions about trades, proprietary statistics and scouting reports.

Secure Your Data with Emojis

Secure Your Data with Emojis

Cute little pics could take the place of PIN codes.

Security at Summer Camps is Not What it Needs to Be

Security at Summer Camps is Not What it Needs to Be

How security professionals can help kids and those who care for them stay safe.

China Hacking Exposes Millions of U.S. Workers

China Hacking Exposes Millions of U.S. Workers

The Obama administration a breach on government workers could affect up to four million citizens.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.