Data Security


China Hacking Exposes Millions of U.S. Workers

China Hacking Exposes Millions of U.S. Workers

The Obama administration a breach on government workers could affect up to four million citizens.

Proficio Introduces ProSCAN Remediation Management Service

Brings new ease, speed, efficiency to enterprise compliance and breach prevention.

USA Freedom Act Approved by Senate and Signed by President Obama

USA Freedom Act Approved by Senate and Signed by President Obama

Phone companies to retain data while NSA must get permission from federal court.

Navigating the Ever Evolving Threat Landscape

Navigating the Ever Evolving Threat Landscape

No matter where you look in the retail sector today, the market seems to be in a perpetual state of transition when it comes to security.

Five Ways to Help Secure Your Data in Light of the IRS Breach

Five Ways to Help Secure Your Data in Light of the IRS Breach

Action steps people can take to make it more difficult for hackers.

Facebook Baits Users with Security Checkup

Facebook Baits Users with Security Checkup

Company provides security features and tools to empower individual account users.

First Online Security Game Launched to Help Educate and Raise Awareness

IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.

Rating a Company

Rating a Company's Security Effectiveness

Tallying the number of alerts and breaches doesn't tell the whole story.



Password Recovery Questions are a Terrible Way to Protect Online Accounts

Password Recovery Questions are a Terrible Way to Protect Online Accounts

A new research paper found that people often choose obvious answers that are easy for hackers to guess.

United Airlines Will Pay Bug Hunters in Air Miles

United Airlines Will Pay Bug Hunters in Air Miles

The airline will pay a maximum of one million miles to anyone who can prove a remote code execution.

Survey Shows Millennials Represent Greatest Risk to Corporate Data

Absolute Software report uncovers usage behavior and security risks of connected employees.

Intercede Teams Up with Citrix to Deliver Strong Authentication

MyID technology allows customers to sign and encrypt email from mobile devices securely using WorxMail.

Hackers Have Figured Out How to Steal from Starbucks Cards

Hackers Have Figured Out How to Steal from Starbucks Cards

Users who have auto-reload setup on their digital card might be vulnerable.

Smart Payment Association Releases Total Market Estimate 2014 Figures

Close to half of cards featured contactless payment capability.

Hard Rock

Hard Rock Reports Security Breach

The hotel & casino says hackers may have access to information about credit and debit cards.

More Comfortable Operations

Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.

CSID Integrates Identity Chek Service Alerts from Early Warning

New offering provides consumers added protection against identity theft through bank account takeover and credit card application fraud alerts.

Verizon Data Breach Study Finds Olds Flaws Still Dangerous

Verizon Data Breach Study Finds Olds Flaws Still Dangerous

The 2015 edition of the DBIR provides insight into the state of cyber-security in 2014.

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

Online Exclusive: ‘Integrated Security’ – Not Just an Industry Buzzword

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

White House Computers are Vulnerable to Hackers

White House Computers are Vulnerable to Hackers

An official has stated that unclassified computers at the White House are vulnerable.

Featured

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.