Emerging Technologies

Read: 3 Easy Steps to Protect IP Cameras From Hackers

3 Easy Steps to Protect IP Cameras From Hackers

IP cameras are just as vulnerable to cyberattacks as any other networked device. Here are three mandatory steps that will eliminate network security weaknesses.

Read: IT Pros Underestimate Impact of Business Partner Security, Report Says

IT Pros Underestimate Impact of Business Partner Security, Report Says

A quarter of respondents admitted their organizations do not evaluate whether suppliers met their security requirements.

Read: ComNet Unveils Security Managed Switch for Use in Cybersecurity Applications

ComNet Unveils Security Managed Switch for Use in Cybersecurity Applications

The RLGE2FE16R is said to prevent unauthorized network access.

Read: Hackers Show How Easy It Is to Break Into Smartphones

Hackers Show How Easy It Is to Break Into Smartphones

A group of hackers showed CBS’ 60 Minutes how vulnerable our personal information is.

Read: Cyber Threat to Security Systems a ‘Real Concern,’ Says IST Co-Founder Andrew Lanning

Cyber Threat to Security Systems a ‘Real Concern,’ Says IST Co-Founder Andrew Lanning

Lanning explains how IST is adapting to cybersecurity concerns and pleads for the industry to do its own due diligence on the subject matter.

Read: DHS: QuickTime on Windows Is a Security Risk & Should Be Uninstalled

DHS: QuickTime on Windows Is a Security Risk & Should Be Uninstalled

Apple announced it will no longer release security updates for the media player software.

Read: Report: U.S. Govt. Ranks Last Among Major Industries on Cybersecurity

Report: U.S. Govt. Ranks Last Among Major Industries on Cybersecurity

Education, telecommunications and pharmaceutical industries also ranked low on cybersecurity.

Read: Few Consumers Stop Doing Business With Hacked Companies

Few Consumers Stop Doing Business With Hacked Companies

A new Rand Corp. study found that only 11% of consumers who have ever been notified of a data breach said they stopped doing business with the hacked company after the event occurred.

Read: How to Protect Wireless Intrusion Systems From Cyber Threats

How to Protect Wireless Intrusion Systems From Cyber Threats

The benefits of wireless systems are well known. But how can security pros arm security systems against attacks via the Internet of Things?

Read: Wichita School Board to Allot $2M to Beef Up Cybersecurity Measures

Wichita School Board to Allot $2M to Beef Up Cybersecurity Measures

The district’s superintendent asked the school board to approve the funding after hackers tried to get access to sensitive financial information.

1 109 110 111 112 113 128
Get Our Newsletters