Articles


Integrating DevSecOps with Your App Development Lifecycle

The Underlying Costs of Fighting Cybercrime

The Asian Dark Web – An Inside Look

DevOps, Cloud, and Next-Gen WAF

Reddit Hacked – What the Experts Are Saying

These Web Browsers Will Help You Surf the Web Stealthily

PowerGhost Cryptominer Targets Business PCs and Servers

Is Russia Planning an Attack Against U.S. Utilities?

Amazon victim of DDoS attack of its own making

How to Perform Physical Penetration Testing

Practical Tips for IoT Security – Are You Secure?

I, CISO

The Evolution of Video Data Protection: Reliability, Performance and Security

Malicious Cryptocurrency Miners Gaining Momentum, Poised for Continued Growth

OneSpan, Nok Nok Team to Bring Top Banks FIDO-Compliant Authentication, User-Friendly Biometrics

Is Your Company’s Biggest Cybersecurity Threat Already on the Inside?

3,000+ mobile apps leaking data from unsecured Firebase databases – What the Experts are Saying

Business Continuity Plans for Banks

For Ultimate Data Center Security, Technology Alone is Not the Answer

Cloud Video as a Service for Visibility into your Connected Operations

Purpose-built Drives for Video Surveillance

EMPOWERING STUDENTS: A CRUCIAL CAMPUS SAFETY RESOURCE

A Hole as a Security Control or Deception in Action

MyHeritage Breach – What the Experts Are Saying

From Access Control to Visitor Management – What Super Enterprises Want

VASCO Launches Trusted Identity Platform, Acquires Dealflo for $55M, Rebrands as OneSpan

Pakistani Activists are being Targeted on Facebook

Biggest Global Cybersecurity Trends in 2018

Are You in the Security Business or the Data Business?

Tools for Averting a Mass Casualty Threat

Automated Drone System Deployed at a Power Plant – This is a First

Artificial Intelligence Embedded in a Camera

Why Your Next Security Guard May Be a Robot Named SCOT

The Importance of Networks in Electronic Security System Design

How to Teach Security Awareness

Pelco’s Data-Centric Paradigm – a closer look

CNP Expo – Where Anti-Fraud Professionals Go To Circle the Wagons

Time to Raise the Bar on Mobile App Security

The Future of Cybersecurity is Convergence

Today is World Password Day and National Day of Prayer; See the Connection?

The Role of Bluetooth in Mobile Access Control

Video Data Security – Providing High Levels of Data Protection

Mivatek Smart Connect talked about “Smart Connect as a Service” at ISC West

What are the Experts saying about PyRoMine?

Mobile Credentials for the Masses

FDA Digital Certificate May 5th Compliance Deadline Looms

How to Perform Social Engineering Engagement using SEEF

Security Must Counteract Threats of Vehicle Terror Attacks

Deception 101: An effective way to understanding deception and chose an appropriate vendor

The Growing Popularity of Smart Phones as Access Control Credentials

Cryptography, Paper Gangsters, and the Blackberry Enterprise Server Long Con

SIA’s Megatrend: Cyber Meets Physical Security

The Missing Link for the UAS Industry

RottenSys Infects Nearly 5 Million Devices

Paypal Shares Your Data with a few Third Parties – More than 600 in fact

Belgium Privacy Watchdog Takes 100 Million Exceptions to Facebook’s Illegal Stalking

Enterprise costs of DDoS attacks exceed $2Mil – Cerero Expert Comments

The US Government Should Have Access to All Encrypted Devices of US Citizens

5 Compelling Reasons to Get a Cyber Security Certification

Predictions for the Future Use of Biometrics

Professional Drone Use in the Security Industry

New Trends in Smart Cities Include Wireless Broadband

How to Remove Malware & Viruses From Android Phones (Oreo Version)

Examining the Threat Posed by Cyberattacks Against Critical Infrastructure

Life Inside China’s Total Surveillance State

Access Control System Design: A single answer for two different questions

Ah! The Lunch and Learn – Is it still a valuable tool?

Malware Threats and Admin Rights: Friend or Foe

Use Big Data Techniques to Track Threats to Your Corporate Data

Hiring your first security professional

Who Are You Allowing in Your House at Night?

Productivity wins when using a cloud terminal server

The Great Debate: What Should We Do About the Flash Problem?

Essential Security Design Elements

Which Candidate Would Be The Most Security Minded President?

Everybody has to have an Ashley Madison story, but…

What? Hiring a security consultant will save me money? How can that be?

When there is a fracture between perception & reality, security suffers

Are We Ready To Retaliate Against China?