Data Security


Path to the Future

Path to the Future

Security professionals face many challenges in selecting video surveillance systems that address their unique needs.

department of justice

Justice Department Indicts 80 People in Massive Online Fraud and Money Laundering Scheme

Two Nigerian citizens are accused of leading a massive fraud scheme that transferred at least $6 million in fraudulently-obtained funds, much of whom was taken from elderly people.

european union flags

European Union Considers Policy to Regulate Use of Facial Recognition Technology

As countries across Europe grapple with the consequences of facial recognition software, EU officials are seeking to limit what the technology can collect and how the data is used.

laptop cybersecurity

Five Surprising Trends in Cybersecurity

The impact of GDPR, the increasing number of issues with shadow IT and the more advanced solutions for IoT devices are among the most surprising trends.

computer keyboard

With 4.1 Billion Records Exposed in Six Months, 2019 Is On Course To Be Record Year For Data Breaches

Only eight breaches were responsible for the exposure of 3.2 billion records in the first half of the year, according to new research.

texas capitol building

Ransomware Attacks Hit 23 Texas Towns, Prompting Statewide Response

The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”

open source vulnerability hacking

The Dangers of Open-Source Vulnerabilities, and What You Can Do About It

Neglecting basic security practices exposes companies to long-standing security threats.

capital one building

Alleged Capital One Hacker Stole From More Than 30 Other Organizations, Prosecutors Say

In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.



fingerprint entrance technology

Security Company Exposes Fingerprint, Facial Recognition Data of Over 1 Million Users

Suprema, which operates the Biostar 2 biometric smart lock system, leaked over 27.8 million records in a publicly accessible database discovered by security researchers.

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.

secure tablet

How Deception Technology Can Help You Detect Threats Early

Deploying automated decoys can help protect your network and reduce IT costs.

Rebuilding Trust After Cybersecurity Lapses

Rebuilding Trust After Cybersecurity Lapses

Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.

A New Age in Corporate Accountability for Data Breaches

Why corporations owe it to you and society as a whole to stop data breaches and fraud

work wifi

10 Simple Steps to Take Right Now to Secure Your Business WiFi Network

Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network

man on computer

Combating Third-Party Excuses to Your Information Security Requests

How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests

Encrypted USB Drives

The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.

capital one card

Capital One Breach Jeopardizes Data of Over 100 Million People

A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.

siri app

Apple Contractors Regularly Overhear ‘Confidential’ Conversations Through Siri, Whistleblower Says

An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.

Using Zero Trust and Conditional Access Policies to Reshape Cybersecurity

Using Zero Trust and Conditional Access Policies to Reshape Cybersecurity

Eliminate trust based on location, such as within a company network, and always verify users at every access request.

medical data

Researchers: Your ‘Anonymous Data’ May Not Be As Anonymous After All

Americans could be signing over the keys to their identity when filling out medical forms that promise to “anonymize” their information, according to a new algorithm developed by scientists.

Featured

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”