Data Security


40 Percent of Companies Have Lost Major Sales Opportunities Because They Could Not Acess Information

40 Percent of Companies Have Lost Major Sales Opportunities Because They Could Not Access Info

Meanwhile, 46% admitted to bypassing security to get their job done, and 40% admitted that if they were breached no one would notice.

Altronix eBridgePlus Ethernet Over Coax and PoE Adapters

Altronix eBridgePlus Ethernet Over Coax and PoE Adapters

Provides extremely cost-effective means to utilize analog infrastructure for networked systems.

Voltage Security Says US Armys Data Insecurity Problems are a Lesson for Us All

Voltage Security Says US Army's Data Insecurity Problems are a Lesson for Us All

According to Mark Bower, even in a highly-controlled organization the size of the US Army, there are going to be operations where staff, for various reasons, ignore their corporate security mandates.

Real Time Technology Group Named 2013 Computerworld Honors Laureate

Real Time Technology Group Named 2013 Computerworld Honors Laureate

To select this year's Laureates, Computerworld relied on a panel of 22 distinguished judges -- many of them Computerworld Premier 100 IT Leader Honorees from diverse industries -- to evaluate the humanitarian benefits and measurable results of applying technology to meet a specific social or business need.

Top 10 Security Apps for iPhone Plus 5 FREE Bonus Apps

Top 10 Security Apps for iPhone Plus 5 FREE Bonus Apps

With over 500,000 apps in the Apple App Store, what security professional has time to wade through that list? I have compiled a list of the top 10 security-related, must-have apps.

Fortinet to Acquire Coyote Point

Fortinet to Acquire Coyote Point

Acquisition further boosts Fortinet’s presence in enterprise by expanding its offerings in the ADC (Application Delivery Controller) market.

Bitzer Mobile Creates App to Enable Security Direct Access to Intranet Files

Bitzer Mobile Creates App to Enable Security Direct Access to Intranet Files

Bitzer has introduced Bitzer m/Drive, an enterprise-grade, mobile app that enables secure, direct access to corporate Intranet files from mobile devices.

Internet Explorer Browser Security Tips

Internet Explorer Browser Security Tips

Don't become the next Internet victim! From lurking spyware to sophisticated hackers, you need to build a line of defense to help ensure safe Internet browsing. Consider the following tips to establish your safe browsing plan with Internet Explorer.



Twitter Hackers Serving Up Extra Large Combos with Burger King

Twitter Hackers Serving Up Extra Large Combos with Burger King

Burger King's catch phrase says, "have it your way," and it seems that's just what hackers did to the company's official Twitter account.

Platinum Tools Appointed Bob Howard Regional Sales Manager

Platinum Tools Appointed Bob Howard Regional Sales Manager

The fast-growing company for the security, datacom, telecom and electrical wiring markets has strengthened its distribution support.

Fully Powered

Fully Powered

PoE is redefining how security professionals design and deploy systems. Rather than using the standard type of power supplies, integrators are increasingly employing PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device.

Eleven Smartphone Habits to Increase Security

Eleven Smartphone Habits to Increase Security

Use this advice to develop habits to create a personal smartphone security plan that is right for you.

More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

According to the United States House Committee on Oversight & Government Reform, over 1.1 million tax returns were filed by identity thieves for the 2011 processing year.

Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

FortiGuard Labs provide enhanced protection capability for their platforms while launching new, cloud-based sandboxing and IP reputation services to help stop advanced persistent threats (APTs).

McAfee Mobile Study Documents Sophistication of Risky Apps

McAfee Mobile Study Documents Sophistication of Risky Apps

McAfee released the results of its “Mobile Security: McAfee Consumer Trends Report,” documenting sophisticated and complex, risky apps containing multi-faceted scams, black market crimes, drive-by downloads and near-field communication threats. The report identifies a new wave of techniques hackers use to steal digital identities, commit financial fraud, and invade users’ privacy on mobile devices.

Looking for Love in All the Wrong Places

A large increase of online daters were found to be using mobile devices, according to iovation, a provider of online reputation protection.

Disaster Recovery

Disaster Recovery

Hurricane Sandy disrupted power, Internet, phone and various other technical services for millions of people and businesses along the East Coast in 2012. In the aftermath of the storm, organizations are reviewing the effectiveness—or lack thereof—of disaster recovery plans across all of their systems.

Android Network Created to Study Cyber Disruptions

Sandia National Laboratories in California have turned to smartphones and other hand-held computing devices to help prevent and mitigate disruptions to computer networks on the Internet as part of ongoing research.

Frankenstein Programmers Test a Cybersecurity Monster

UT Dallas computer scientists are trying to stay one step ahead of cyber attackers by creating their own monster. Their monster can cloak itself as it steals and reconfigures information in a computer program.

AT&T Extends Cloud-Based MDM to Small Businesses

Recognizing that small business owners need a highly secure, affordable way to manage wireless devices, AT&T has expanded its cloud-based Mobile Device Management (MDM) offering with solutions for small businesses with a robust list of features previously available only to larger enterprise customers.

Featured

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.