Data Security


Part 6: Taking Control of the Stick

Part 6: Taking Control of the Stick

5 steps to help professionalize the cybersecurity workforce.

Part 5: Wake the Flight Crew

Part 5: Wake the Flight Crew

Five key areas of understanding for information security directors.

Pay Now or Pay Later

Part 4: Pay Now or Pay Later

Breaches of all sizes - small, medium and large - ruin reputations and can cost millions of dollars.

Back to the Future

Part 3: Back to the Future

Bolting on security after the fact is always more costly, time consuming and less effective.

Android Security Flaw Leaves 950 Million Phones Vulnerable

Android Security Flaw Leaves 950 Million Phones Vulnerable

The devices can be hacked using a simple MMS message.

Online Exclusive Series Part 2: A Glimmer of Hope

Online Exclusive Series Part 2: A Glimmer of Hope

International Information Systems Security Certification Consortium of 1988 formed among several professional organizations to create a global information security certification process for professionals and address the need for standardized curriculum.

Online Exclusive Series Part 1: In the Beginning

Online Exclusive Series Part 1: In the Beginning

What does information security have in common with Eastern Air Lines Flight 401? It’s an odd question, with an important — and potentially tragic — answer.

Code Dx Expands Reseller Program with Addition of CM-Logic

Partnership will expand reach for Code Dx's software vulnerability management system to Europe.



Google Disables Flash Due to Security Concerns

Google Disables Flash Due to Security Concerns

Mozilla also disabled the web-enabled video software.

21 Million Social Security Numbers Stolen in Second OPM Data Breach

21 Million Social Security Numbers Stolen in Second OPM Data Breach

Credit monitoring and identity-theft protection offered to those affected.

How Colleges and Universities Defend Against Cyber Threats

How Colleges and Universities Defend Against Cyber Threats

Take into consideration the hackers' motivation, then develop a plan of action.

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Online Exclusive: Electronic Access Control for the Medical Facility and Beyond

Increasing mobility of equipment raises new concerns of managing access and keeping data confidential.

United Airlines Resuming Flights after Computer Glitch

United Airlines Resuming Flights after Computer Glitch

Flights were grounded nationwide due to a network connectivity issue.

Smarter Storage - Benefits drive expansion of IP video systems in Bergen County, N.J.

Smarter Storage

The advantages of video surveillance are well known, but at times, the full value is realized only after a system is installed.

Google Security Researcher Leaves to Take on New Project

Google Security Researcher Leaves to Take on New Project

The researcher known as Mudge plans to start a non-profit devoted to software security.

Safe-T Box 6.0 Secures Data in the Cloud

Unified Secure Data Exchange Broker solution consolidates email, file, mobile and cloud data security.

Facebook Hires Yahoo’s Chief Security Executive

Facebook Hires Yahoo's Chief Security Executive

Alex Stamos starts his new job as the company’s chief security officer.

SureView Systems Announces Integration with PPM

Immix CC Enterprise Command Center Software completes integration with Perspective.

Banks Show Vulnerabilities in Website Security

Banks Show Vulnerabilities in Website Security

Banks such as HSBC and TD Bank are behind the times when it comes to protecting their digital assets.

New Report Puts Samsung Galaxy Users at Risk

New Report Puts Samsung Galaxy Users at Risk

Private information stored on the phone could easily be accessed.

Featured

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.