Today’s Most Interesting Security News


When Every Second Counts One of the hottest topics in our current political climate, internet discussions, and social dialog is the phenomenon of active shooter incidents, or “mass shootings.” Media outlets saturate their broadcast time with reports that in one way or another reference these crimes. Politicians list it as […]

When Seconds Count – How One Company is Using AI ...


MetTel IoT Fleet Management Transforms Brosnan SmartTrucks into Mobile Command Centers Brosnan Security, the renowned national security officer firm, has unveiled its newest SmartTruck, transformed by MetTel IoT into a connected mobile command center capable of instant internal and external threat and efficiency detection, analysis and response.  Brosnan is rolling out […]

Mobile Command Centers to Safeguard Retailers Nationwide


As you are likely aware by now, Quest Diagnostics – one of the biggest blood testing providers in the country – warned Monday that nearly 12 million of its customers may have had personal, financial, and medical information breached due to an issue with one of its vendors. This kind […]

Quest Diagnostics Breach – What the Experts are Saying



A massive database containing the contact information of millions of Instagram influencers, celebrities, and brand accounts has been exposed online. The database, hosted by Amazon Web Services, was left without a password allowing anyone to look inside.  It is thought that the database has over 49 million records. Discovered by […]

Instagram Influencers Account and Contact Information Exposed – What the ...


The Use of Robotics is Set to Change the Private Security Guard Industry The cost of hiring a security guard to watch your assets and report criminal activity or safety incidents is estimated to be from $12 to $20 per hour.  So, what would happen to the security guard industry […]

Why Your Next Security Guard May Be a Robot Named ...


Recently, FortiGuard Labs uncovered a new python-based cryptocurrency mining malware that uses the ETERNALROMANCE exploit, and they have dubbed it “PyRoMine.”  Originally reported on the Fortinet Blog, this malware is particularly malicious in that it “not only uses the machine for cryptocurrency mining, but it also opens the machine for […]

What are the Experts saying about PyRoMine?



Guest Contributor: Greg Hetrick, Marketing Manager for PCSC For the past few decades, physical proximity cards were standard issue. Businesses assigned plastic cards to employees and visitors and cards opened doors where permission was granted. Cards were lost, stolen, and no one was sure the person using the card matched […]

Mobile Credentials for the Masses


“Critical infrastructure – from the electrical grid to transportation – is under assault, and hackers are evading conventional security defenses,” said John DeSimone, vice president of Cybersecurity and Special Missions at Raytheon Intelligence, Information and Services. “Commercial tools from companies like Virsec can help bridge the gap for our global government […]

Critical Infrastructure is Under Assault – Raytheon and Virsec May ...


Mandate Requires Electronic Submission of Drug Master Files Using Trusted Digital Certificates Time is running short, and the rush is on for organizations that transact with the FDA to get trusted digital certificates for all individuals working on their behalf.  Starting May 5th, the FDA will require all drug master file submissions […]

FDA Digital Certificate May 5th Compliance Deadline Looms




The “Uncommon” Is Becoming the “All Too Common” Guest Contributor: Greg Hamm, Delta Scientific, Vice President – Sales & Marketing Recently, on April 23, 2018, a white rental van intentionally plowed down a crowd of pedestrians in the Toronto suburb of Richmond Hill, killing ten and injuring 15. On October 31, […]

Security Must Counteract Threats of Vehicle Terror Attacks


Guest Contributor: Scott Lindley, General Manager, Farpointe Data Smartphones fulfill many needs, including telephone, camera, navigation, music, video, clock, news, calculator, email, Internet, gaming, contacts, and more. Security professionals creating access control systems need to be aware that 95+ percent of all adults 18-44 years own smartphones. Plus, 69 percent of […]

The Growing Popularity of Smart Phones as Access Control Credentials