Cybersecurity

Read: New Securitas Brand, Securitas Electronic Security (ES), Unveiled at ASIS 2016

New Securitas Brand, Securitas Electronic Security (ES), Unveiled at ASIS 2016

Securitas introduces new Securitas Electronic Security (ES) branding, the result of several months of transition to integrate the security expertise of Diebold Security with the brand recognition of Securitas.

Read: Feenics V3 Software Heightens User Experience, Enhances Scalability

Feenics V3 Software Heightens User Experience, Enhances Scalability

Keep by Feenics is said to simplify the management of security, access control and other integrated technologies at the protected premises.

Read: Less Than One-Third of Organizations Prepared for IoT Security Risks, Survey Finds

Less Than One-Third of Organizations Prepared for IoT Security Risks, Survey Finds

Nearly half of the respondents expect the number of IoT devices on their networks to increase by at least 37% in 2017.

Read: Surveillance Systems Inc. Launches Cybersecurity Division

Surveillance Systems Inc. Launches Cybersecurity Division

The integrator will now offer services to combat malicious backdoor access, denial-of-service attacks, IP spoofing and other data-breach threats.

Read: Samsung SDS to Partner With Cybersecurity Specialist Darktrace

Samsung SDS to Partner With Cybersecurity Specialist Darktrace

The partnership agreement follows a recent investment in Darktrace by Samsung SDS.

Read: 6 Tips for Reducing Internet of Things Security Risks

6 Tips for Reducing Internet of Things Security Risks

As the IoT expands, small businesses need to take the following commonsense steps to reduce the risks the ever-expanding IoT presents.

Read: Smart Electrical Socket Could Be Exploited to Hack Email

Smart Electrical Socket Could Be Exploited to Hack Email

A vulnerability in a popular brand of smart electrical sockets has been found that could allow hackers to spread malicious software to connected devices.

Read: How to Box Hackers Out of Your ID Card Access Control Systems

How to Box Hackers Out of Your ID Card Access Control Systems

ID harvesting has made it necessary for security pros to add card encryption to their physical access control systems.

Read: ‘Threat Intellect’ Service Examines Billions of Network Security Events in Minutes, AT&T Says

‘Threat Intellect’ Service Examines Billions of Network Security Events in Minutes, AT&T Says

The technology helps to identify abnormal and malicious activity based on data patterns.

Read: Avast to Acquire Antivirus Software Rival AVG for $1.3B

Avast to Acquire Antivirus Software Rival AVG for $1.3B

The all-cash deal is expected to create one of the largest antivirus companies by market share in the world.

1 51 52 53 54 55 68
Get Our Newsletters