Articles 3,000+ mobile apps leaking data from unsecured Firebase databases – What the Experts are Saying Business Continuity Plans for Banks For Ultimate Data Center Security, Technology Alone is Not the Answer Cloud Video as a Service for Visibility into your Connected Operations Purpose-built Drives for Video Surveillance EMPOWERING STUDENTS: A CRUCIAL CAMPUS SAFETY RESOURCE A Hole as a Security Control or Deception in Action MyHeritage Breach – What the Experts Are Saying From Access Control to Visitor Management – What Super Enterprises Want VASCO Launches Trusted Identity Platform, Acquires Dealflo for $55M, Rebrands as OneSpan Pakistani Activists are being Targeted on Facebook Biggest Global Cybersecurity Trends in 2018 Are You in the Security Business or the Data Business? Tools for Averting a Mass Casualty Threat Automated Drone System Deployed at a Power Plant – This is a First Artificial Intelligence Embedded in a Camera Why Your Next Security Guard May Be a Robot Named SCOT The Importance of Networks in Electronic Security System Design How to Teach Security Awareness Pelco’s Data-Centric Paradigm – a closer look CNP Expo – Where Anti-Fraud Professionals Go To Circle the Wagons Time to Raise the Bar on Mobile App Security The Future of Cybersecurity is Convergence Today is World Password Day and National Day of Prayer; See the Connection? The Role of Bluetooth in Mobile Access Control Video Data Security – Providing High Levels of Data Protection Mivatek Smart Connect talked about “Smart Connect as a Service” at ISC West What are the Experts saying about PyRoMine? Mobile Credentials for the Masses FDA Digital Certificate May 5th Compliance Deadline Looms How to Perform Social Engineering Engagement using SEEF Security Must Counteract Threats of Vehicle Terror Attacks Deception 101: An effective way to understanding deception and chose an appropriate vendor The Growing Popularity of Smart Phones as Access Control Credentials Cryptography, Paper Gangsters, and the Blackberry Enterprise Server Long Con SIA’s Megatrend: Cyber Meets Physical Security The Missing Link for the UAS Industry RottenSys Infects Nearly 5 Million Devices Paypal Shares Your Data with a few Third Parties – More than 600 in fact Belgium Privacy Watchdog Takes 100 Million Exceptions to Facebook’s Illegal Stalking Enterprise costs of DDoS attacks exceed $2Mil – Cerero Expert Comments The US Government Should Have Access to All Encrypted Devices of US Citizens 5 Compelling Reasons to Get a Cyber Security Certification Predictions for the Future Use of Biometrics Professional Drone Use in the Security Industry New Trends in Smart Cities Include Wireless Broadband How to Remove Malware & Viruses From Android Phones (Oreo Version) Examining the Threat Posed by Cyberattacks Against Critical Infrastructure Life Inside China’s Total Surveillance State Access Control System Design: A single answer for two different questions Ah! The Lunch and Learn – Is it still a valuable tool? Malware Threats and Admin Rights: Friend or Foe Use Big Data Techniques to Track Threats to Your Corporate Data Hiring your first security professional Who Are You Allowing in Your House at Night? Productivity wins when using a cloud terminal server The Great Debate: What Should We Do About the Flash Problem? Essential Security Design Elements Which Candidate Would Be The Most Security Minded President? Everybody has to have an Ashley Madison story, but… What? Hiring a security consultant will save me money? How can that be? When there is a fracture between perception & reality, security suffers Are We Ready To Retaliate Against China?