Free webinar on campus reporting procedures being offered on September 19 Montreal, September 4, 2019 – Montreal-based TrackTik, the leading workforce management solution for physical security, is pleased to announce its sponsorship of Clery Center’s National Campus Safety Awareness Month (NCSAM) 2019.  NCSAM originated in 2008 following unanimous congressional support for increased […]

Security Technology Leader TrackTik Announces Partnership with Clery Center to ...


New York, New York—​Vaion, just a few months out of stealth mode, today announces its launch into the North American market with comprehensive demonstrations at​ ​GSX 2019​. Vaion will exhibit in booth #1819 with a rapidly expanding commercial team ready to provide custom demos. Visitors will examine real-world scenarios which […]

Vaion is Gaining Momentum – See Why at GSX 2019


By Mr. Shomiron Dasgupta, CEO and Founder, DNIF Cyber threats have been prevalent on the internet for decades now. Unfortunately, malware has been evolving more rapidly than the anti-malware software needed to combat it. The three most active cyber threat categories worldwide are currently ransomware, phishing, and endpoint attacks. Ransomware […]

Top 3 Cyber Threats and their analysis


by: Moshe Elias, Director of Product Marketing, Allot IoT connectivity is the new way of life. From smart printers and televisions to lamps and baby monitors, the use of IoT devices continues to trend up each year. However, the popularity of these devices is no indicator of their safety. In […]

The Commonality of the Brute Force IoT Attack



By Scott Lindley, General Manager, Farpointe Data The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology. As a matter of fact, research analyst Gartner has predicted that, by 2020, one in five […]

Why Mobile Access Is More Secure than Card Systems


Arkose Labs analyzed over 1.2 billion transactions across the financial services, e-commerce, travel, social media, gaming and entertainment industries, highlighting key trends Social media sites have become lucrative targets for criminals looking for quick monetization. To gain some additional insights into this phenomenon, we spoke with Vanita Pandey, VP Strategy […]

More Than Half of Logins on Social Media Platforms are ...


One of the scariest things about online scams is their impact on enormous segments of the population. The victims often deal with reputational damage and expenses associated with recovering from the attack and improving their current computer security practices to reduce the chances of something happening again. Anyone needing a […]

Cofense Labs Uncovers Large Scam Targeting Millions


Recently the well-known provider of service assurance, cybersecurity, and business intelligence solutions, NETSCOUT Systems Inc, released its semi-annual Threat Intelligence Report highlighting cybercrime as a mainstream business model. The report also examines the maturation of Nation-State sponsored Advanced Persistent Threat (ATP) groups and new findings on IoT vulnerabilities. With a […]

New Report Highlights Cybercrime Innovation



TrackTik Software’s mobile and web-friendly guard tour system uses automation to take the effectiveness and efficiency of an organization’s security management operations to the next level.  This first-of-its-kind system provides security managers with a custom-tailored, holistic view of their operations and security personnel on tour with the support and safety of having “a coach in their […]

TrackTik Software Offers Breakthrough Automation for Security Workforce Management


Deep Learning Proves Key to Detecting Known and Unknown Threats Hiding in Encrypted Web, Network Communications Blue Hexagon, a deep learning and cybersecurity pioneer, announced an industry-first ability to detect and stop–in real-time–both known and unknown threats hidden within encrypted SSL traffic. On the heels of this announcement, Brilliance Security […]

When You Live and Die by the 1-Second Rule


By Matthias Völkl, Cherry, Vice President Business Unit Office & Security Did you know that 87 percent of companies rely on employees having access to mobile business apps from their personal smartphones? It wasn’t so long ago that employers issued the same computer equipment to each employee — regardless of work […]

6 Facts You Should Know About the Future of BYOD


New findings from Cequence Security’ CQ Prime research team uncovers the use of Bulletproof Proxy networks by bad actors to automated bot attacks against web applications. “Bulletproof Proxies: The Evolving Cybercriminal Infrastructure” details how bulletproof proxy providers include millions of globally distributed IP addresses that are marketed under the guise of legitimate […]

Bulletproof Proxy Networks Target Retail and Financial Web Applications, Mobile ...