CyberSecurity


Google Disables Flash Due to Security Concerns

Google Disables Flash Due to Security Concerns

Mozilla also disabled the web-enabled video software.



Futuristic Replacements for Passwords

Futuristic Replacements for Passwords

Since introduction of computer passwords, not much has changed...until now.

21 Million Social Security Numbers Stolen in Second OPM Data Breach

21 Million Social Security Numbers Stolen in Second OPM Data Breach

Credit monitoring and identity-theft protection offered to those affected.

How Colleges and Universities Defend Against Cyber Threats

How Colleges and Universities Defend Against Cyber Threats

Take into consideration the hackers' motivation, then develop a plan of action.

Security Startup Octopus Raises $2.5M

Security Startup Octopus Raises $2.5M

The cloud-based physical security tool raised the money from a group called Singulariteam.

United Airlines Resuming Flights after Computer Glitch

United Airlines Resuming Flights after Computer Glitch

Flights were grounded nationwide due to a network connectivity issue.

China Adopts New National Security Law

China Adopts New National Security Law

Critics have said the law might be used to eliminate dissent.

Google Security Researcher Leaves to Take on New Project

Google Security Researcher Leaves to Take on New Project

The researcher known as Mudge plans to start a non-profit devoted to software security.

Facebook Hires Yahoo’s Chief Security Executive

Facebook Hires Yahoo's Chief Security Executive

Alex Stamos starts his new job as the company’s chief security officer.

Banks Show Vulnerabilities in Website Security

Banks Show Vulnerabilities in Website Security

Banks such as HSBC and TD Bank are behind the times when it comes to protecting their digital assets.

New Report Puts Samsung Galaxy Users at Risk

New Report Puts Samsung Galaxy Users at Risk

Private information stored on the phone could easily be accessed.

Houston Astros

Houston Astros' Ground Control System Hacked, Possibly by Rival Team

Network contained internal discussions about trades, proprietary statistics and scouting reports.

LUCY Data Security Solution Acts as “Crash Test Dummy” to Emulate Cyberattacks

Helps find security weakest links to prevent phishing, malware and drive-by attacks.

New Exabeam User Behavior Analytics Software Release

Additional features in Exabeam Version 1.7 combine behavior analytics, data science and machine learning to empower customers with tools and context needed to thwart cyberattacks.

China Hacking Exposes Millions of U.S. Workers

China Hacking Exposes Millions of U.S. Workers

The Obama administration a breach on government workers could affect up to four million citizens.

Facebook Baits Users with Security Checkup

Facebook Baits Users with Security Checkup

Company provides security features and tools to empower individual account users.

First Online Security Game Launched to Help Educate and Raise Awareness

IS Decisions launched ‘The Weakest Link: A user security game,' with the input of security experts and analysts.

Rating a Company

Rating a Company's Security Effectiveness

Tallying the number of alerts and breaches doesn't tell the whole story.

Password Recovery Questions are a Terrible Way to Protect Online Accounts

Password Recovery Questions are a Terrible Way to Protect Online Accounts

A new research paper found that people often choose obvious answers that are easy for hackers to guess.

United Airlines Will Pay Bug Hunters in Air Miles

United Airlines Will Pay Bug Hunters in Air Miles

The airline will pay a maximum of one million miles to anyone who can prove a remote code execution.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3