Yearly Archives: 2019


Free webinar on campus reporting procedures being offered on September 19 Montreal, September 4, 2019 – Montreal-based TrackTik, the leading workforce management solution for physical security, is pleased to announce its sponsorship of Clery Center’s National Campus Safety Awareness Month (NCSAM) 2019.  NCSAM originated in 2008 following unanimous congressional support for increased […]

Security Technology Leader TrackTik Announces Partnership with Clery Center to ...







Arkose Labs analyzed over 1.2 billion transactions across the financial services, e-commerce, travel, social media, gaming and entertainment industries, highlighting key trends Social media sites have become lucrative targets for criminals looking for quick monetization. To gain some additional insights into this phenomenon, we spoke with Vanita Pandey, VP Strategy […]

More Than Half of Logins on Social Media Platforms are ...




Recently the well-known provider of service assurance, cybersecurity, and business intelligence solutions, NETSCOUT Systems Inc, released its semi-annual Threat Intelligence Report highlighting cybercrime as a mainstream business model. The report also examines the maturation of Nation-State sponsored Advanced Persistent Threat (ATP) groups and new findings on IoT vulnerabilities. With a […]

New Report Highlights Cybercrime Innovation


TrackTik Software’s mobile and web-friendly guard tour system uses automation to take the effectiveness and efficiency of an organization’s security management operations to the next level.  This first-of-its-kind system provides security managers with a custom-tailored, holistic view of their operations and security personnel on tour with the support and safety of having “a coach in their […]

TrackTik Software Offers Breakthrough Automation for Security Workforce Management



Deep Learning Proves Key to Detecting Known and Unknown Threats Hiding in Encrypted Web, Network Communications Blue Hexagon, a deep learning and cybersecurity pioneer, announced an industry-first ability to detect and stop–in real-time–both known and unknown threats hidden within encrypted SSL traffic. On the heels of this announcement, Brilliance Security […]

When You Live and Die by the 1-Second Rule



New findings from Cequence Security’ CQ Prime research team uncovers the use of Bulletproof Proxy networks by bad actors to automated bot attacks against web applications. “Bulletproof Proxies: The Evolving Cybercriminal Infrastructure” details how bulletproof proxy providers include millions of globally distributed IP addresses that are marketed under the guise of legitimate […]

Bulletproof Proxy Networks Target Retail and Financial Web Applications, Mobile ...