Top Stories


Top 5 Tips to Prevent Data Breaches

Top 5 Tips to Prevent Data Breaches

With hacks, attacks, ransoms and even extortion attempts, 2017 has been the year of data breaches, and it’s not even over yet.

Best Practices for Deploying PSIM Quickly and Efficiently

Best Practices for Deploying PSIM Quickly and Efficiently

No enterprise can eliminate 100% of its risk. Instead, the security objective must be to understand all risks and to effectively manage and mitigate them.

4 Tips to Get Through TSA Quickly This Thanksgiving

4 Tips to Get Through TSA Quickly This Thanksgiving

The Transportation Security Administration expects more than 2.4 million passengers per day to pass through their checkpoints nationwide as people travel in the days leading up to Thanksgiving.



"Gray Saturday" Safer for Online Shopping

"Gray Saturday" Safer for Online Shopping

Kaspersky Lab’s review of phishing attacks during the holiday sales season found that the number of phishing attacks can decrease by as much as 33 percent on the day after Black Friday.

Black Friday 2017 Top Deals on Security

Black Friday 2017: Top Deals on Security

Ring, Arlo and Nest are among the security companies with the best deals this Black Friday.

Arecont Vision Names PAR Products as Manufacturer's Representatives for TOLA Region

Arecont Vision®, the industry leader in IP-based megapixel camera technology, has announced that PAR Products has joined the company’s Manufacturer’s Representative Partner program.

Vulnerability in Amazon Key

Vulnerability in Amazon Key's Camera Allows Couriers Back in Your House

Amazon has addressed the hack and will be rolling out an update next week.

Trump Administration Releases VEP Charter to Increase Transparency

The Trump Administration released a new 14-page charter Wednesday detailing the Vulnerabilities Equities Process (VEP), which the federal government uses to determine if, how and when it tells private companies about zero-day security flaws.

Michigan Church Closed Tuesday After Threat List Found

Michigan Church Closed Tuesday After Threat List Found

A church in Michigan was closed Tuesday after its inclusion on a threat list that included multiple houses of worship.

Google Details New Pixel 2 Security Module

Google Details New Pixel 2 Security Module

The goal of the new security module, Google said, is to prevent attackers from decrypting your data without knowing your password by reinforcing the lock screen against attacks.

3 Toys NOT to Buy Your Kids This Holiday Season

3 Toys NOT to Buy Your Kids This Holiday Season

Connected toys may excite kids, but parents need to be wary.

UCC Names Tom McNeil As National Account Executive

McNeil’s industry experience will help UCC expand its focus to this important region of the country.

Hackers Trick Face ID with 3-D Printed Mask

Hackers Trick Face ID with 3-D Printed Mask

Days after the iPhone X’s official release, hackers in Vietnam have successfully tricked Face ID and unlocked the smartphone with a 3-D-printed mask.

Shooting Spree in California Involves Elementary School

UPDATE: Gunman in California Shooting Spree Stopped by Lockdown Procedures

Tehama County Sheriff says five people are dead, including the gunman, following a shooting spree in California.

ADT Acquires DATASHIELD to Launch ADT Cybersecurity for Commercial Business Customers Nationwide

Newly Combined Entity Utilizes DATASHIELD’s Cutting-Edge SHIELDVision™ Platform and Deep Security Industry Expertise to Create an Unmatched Real-Time Cyber Detection & Response Solution

Razberi Cybersecurity Solution Integrated with Milestone Systems XProtect VMS

Combination creates a single management and operational dashboard to protect video surveillance systems from cyber threats.

Boeing 757 Hacked by DHS in Test

Boeing 757 Hacked by DHS in Test

According to Robert Hickey, aviation program manager within the Cyber Security Division of the DHS Science and Technology (S&T) Directorate, the hack was conducted last year on a 757 parked at the airport in Atlantic City, N.J.

Two Dead and Two Injured after Atlanta Concert Shooting

Two Dead and Two Injured after Atlanta Concert Shooting

Two people are dead and two are injured after a shooting that took place Sunday night during a concert in Atlanta, Georgia.

Featured

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”