Data Security


Jimmy John’s Shops Hit by Data Breach

Jimmy John’s Shops Hit by Data Breach

Over 200 restaurants were affected

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

Sophisticated hackers able to lift fingerprints, replicate them and then use them to activate sensors on Apple smartphones.

Apple Can’t Unlock your iPhone for the Police, even with a Search Warrant

Apple Can’t Unlock Your iPhone for the Police, Even With a Search Warrant

The company says it has made it impossible in order to deflect allegations of collecting user information.

VidSys Demonstrating its New Release 7.7 PSIM Software at ASIS

National Language Support means that the software can easily adapt to various languages without code changes.

The Home Depot Hack was Easy

The Home Depot Hack was Easy

Another hack in the long line of recent cyber-attacks, Home Depot’s issues showcase a bigger problem: the simplicity of the hack

Security Partners and CheckVideo Announce Partnership

Managed video sales training teaches technology's real-time capabilities, among other imporant concepts, to sales reps.

HealthCare.gov Faces Security Breach Scare

HealthCare.gov Faces Security Breach Scare

A test version of the government’s health insurance site was hacked.

Apple Adds Additional Layer of Security to iCloud

Apple Adds Additional Layer of Security to iCloud

Three things you can do to better protect the data on your cloud.



LENSEC Teaming Up with Ingram Micro

LENSEC and Ingram Micro will roll out the new Perspective NVA at the Fall ONE Event.

AvaLAN Wireless Launches 900MHz Frequency Hopper

AW900F Industrial Wireless Ethernet delivers long range, reliable speed and secure wireless networking.

Q and A with Chief Information Security Officer at Duke University about Yubico

Q and A with Chief Information Security Officer at Duke University about Yubico

Richard Biever talks strong authentication, two-factor authentication, YubiKey, user feedback and working with Yubico.

Data Breaches: Who’s Ultimately Responsible?

In 0.27 seconds, these were the top headlines that Google pulled from 67,500 results highlighting the latest data breaches around the globe.

Google Maps Tracks Your Every Step – But You Can Stop It

Google Maps Tracks Your Every Step – But You Can Stop It

A little-known data collecting process by Google can be switched off.

Real-Time Technology Group Partners with All Points to Deliver Advanced Identity Management

Real-Time Technology Group Partners with All Points to Deliver Advanced Identity Management

Partnership enables RTTG to bring their Real-Time Verification (RTV) technology platform to state and federal customers.

Action Steps for Parents to Do Today to Protect Student Data

Action Steps for Parents to Do Today to Protect Student Data

These actions will help put you back in control of your child's data.

How Schools Use Private Student Data

How Schools Use Private Student Data

Non-educators want access to student data to apply principles of big data analysis to it.

POS Systems in Terrible State of Security

POS Systems in Terrible State of Security

Same malware used in Target attack also targeted more than a thousand other U.S. businesses.

UPS Confirms Data Breach

UPS Confirms Data Breach

The shipping company found that 51 stores have been hacked

New Website Publicly Shames Apps and Services without Encryption

New Website Publicly Shames Apps and Services without Encryption

Companies called out for jeopardizing the security and privacy of their users.

Hospital Security Breach Steals Data from 4.5 Million Patients

Hospital Security Breach Steals Data from 4.5 Million Patients

Community Health Systems in Central Florida hospitals are affected by the breach

Featured

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.