Data Security


Voltage Security Comments on Largest US Data Breach

Voltage Security Comments on Largest US Data Breach

The risk is still here and demands a data-centric approach to security.

Twitter Tracks Users for Sake of Social Media Ads

Twitter Tracks Users for Sake of Social Media Ads

New off-site tracking is Twitter’s way of relaying information to advertisers to create customized ads.

Chinese Cyber Attacks Cost American Universities Billions

Chinese Cyber Attacks Cost American Universities Billions

American universities concerned as cyber attacks try to barge their way in.

Google Privacy Policy in Hot Water in Europe

Google Privacy Policy in Hot Water in Europe

Google targeted about the vast amount of personal data it collects on a daily basis from users.

Safe and Secure Data in a Digital World

Safe and Secure Video Data in a Digital World

As the world moves more and more toward digital, securing data is essential.

Security Market Analysis of Three Major Trends

Security Market Analysis of Three Major Trends

As the security industry continues to grow, dealers and integrators must focus on trends within the industry in order to position themselves for growth.

Fortinet Introduces Next Generation Operating System for Web Application Firewall Product Family

Fortinet Introduces Next Generation Operating System for Web Application Firewall Product Family

Features critical security advancements, including the ability to accurately identify the origin of Web application traffic to proactively distinguish between legitimate and malicious sources.

Cybersecurity Defensive Stance Protects Small Business Computers

Cybersecurity Defensive Stance Protects Small Business Computers

Cybercriminals are taking a toll on small businesses. Revealed here are some of cybercriminals' most popular tactics and how small businesses can counter-act them.



SWAC from RTTG Ensures Members Who Access Critical Infrastructure Sites are Safe

SWAC from RTTG Ensures Members Who Access Critical Infrastructure Sites are Safe

Known simply as SWAC, this Secure Worker Access Consortium, driven by RTTG's Real-Time Verification (RTV) technology platform, is a comprehensive, highly-secure, information-sharing program that helps to ensure that workers who access critical facilities or key infrastructures are known, safe and threat-free.

Tyfone Connected Smart Card Solution Fixes Cyber Security and Biometric Vulnerabilities

Tyfone Connected Smart Card Solution Fixes Cyber Security and Biometric Vulnerabilities

Tyfone combines local- and cloud-based technologies for trusted verification of passwords, biometrics and other digital ID credentials to counter security breaches.

HID Global Drives Initiative for Partners to Develop NFC Trusted Tag Applications

HID Global Drives Initiative for Partners to Develop NFC Trusted Tag Applications

HID Global’s focus areas of use for new applications include authentication of items, secure data management and trusted authorizations.

40 Percent of Companies Have Lost Major Sales Opportunities Because They Could Not Acess Information

40 Percent of Companies Have Lost Major Sales Opportunities Because They Could Not Access Info

Meanwhile, 46% admitted to bypassing security to get their job done, and 40% admitted that if they were breached no one would notice.

Altronix eBridgePlus Ethernet Over Coax and PoE Adapters

Altronix eBridgePlus Ethernet Over Coax and PoE Adapters

Provides extremely cost-effective means to utilize analog infrastructure for networked systems.

Voltage Security Says US Armys Data Insecurity Problems are a Lesson for Us All

Voltage Security Says US Army's Data Insecurity Problems are a Lesson for Us All

According to Mark Bower, even in a highly-controlled organization the size of the US Army, there are going to be operations where staff, for various reasons, ignore their corporate security mandates.

Real Time Technology Group Named 2013 Computerworld Honors Laureate

Real Time Technology Group Named 2013 Computerworld Honors Laureate

To select this year's Laureates, Computerworld relied on a panel of 22 distinguished judges -- many of them Computerworld Premier 100 IT Leader Honorees from diverse industries -- to evaluate the humanitarian benefits and measurable results of applying technology to meet a specific social or business need.

Top 10 Security Apps for iPhone Plus 5 FREE Bonus Apps

Top 10 Security Apps for iPhone Plus 5 FREE Bonus Apps

With over 500,000 apps in the Apple App Store, what security professional has time to wade through that list? I have compiled a list of the top 10 security-related, must-have apps.

Fortinet to Acquire Coyote Point

Fortinet to Acquire Coyote Point

Acquisition further boosts Fortinet’s presence in enterprise by expanding its offerings in the ADC (Application Delivery Controller) market.

Bitzer Mobile Creates App to Enable Security Direct Access to Intranet Files

Bitzer Mobile Creates App to Enable Security Direct Access to Intranet Files

Bitzer has introduced Bitzer m/Drive, an enterprise-grade, mobile app that enables secure, direct access to corporate Intranet files from mobile devices.

Internet Explorer Browser Security Tips

Internet Explorer Browser Security Tips

Don't become the next Internet victim! From lurking spyware to sophisticated hackers, you need to build a line of defense to help ensure safe Internet browsing. Consider the following tips to establish your safe browsing plan with Internet Explorer.

Twitter Hackers Serving Up Extra Large Combos with Burger King

Twitter Hackers Serving Up Extra Large Combos with Burger King

Burger King's catch phrase says, "have it your way," and it seems that's just what hackers did to the company's official Twitter account.

Featured

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.