Monthly Archives: June 2018


As readers of this online security magazine largely understand, Cryptocurrency mining is the process by which transactions are verified and tallied to the public ledger, known as the blockchain, and also the means through which new currency is released. Anyone with access to the internet and suitable computer processing power […]

Malicious Cryptocurrency Miners Gaining Momentum, Poised for Continued Growth



Findings were reported today by HelpNet Security that  3,000+ mobile iOS and Android apps are potentially leaking PII data from unsecured Firebase databases.  So far, affected apps have been downloaded 620 million times for Android devices (the iOS download rate is unknown). Researchers with Appthority say 62% of enterprises are likely impacted by […]

3,000+ mobile apps leaking data from unsecured Firebase databases – ...



Business continuity is a concept that refers to the planning and preparation to make sure a company overcomes serious incidents or disasters and resumes its normal operations within a short period of time. This concept includes the following key elements: Resilience: critical business functions and the supporting infrastructure must be […]

Business Continuity Plans for Banks


Guest Contributor: Arturo Maqueo, Regional Sales Engineering Director LATAM, Flexenclosure The security of data – and in particular people’s personal data – has been a hot topic in recent months. The EU’s rollout of new GDPR regulations; the Cambridge Analytica scandal; or the seemingly weekly revelations of financial institutions or consumer […]

For Ultimate Data Center Security, Technology Alone is Not the ...


Big business loves big data.  Data is the fuel needed for today’s enterprise to move forward or to change direction.  Video is simply more data.  As security video has moved away from analog streams stored on tapes toward the ones and zeros more familiar to data analysts, businesses have been eyeing video […]

Cloud Video as a Service for Visibility into your Connected ...





Electronic access control systems do a great job of restricting access through openings that are designed to be used by your employees and vendors.  No valid card, no entry.  But, for many organizations, that is not where most people enter their facility.  It’s the main lobby or other public entrances […]

From Access Control to Visitor Management – What Super Enterprises ...