The integration and reporting of alarm, video, and access control security systems along with audio files are creating huge amounts of data that need to be stored and managed on a daily basis. If not done properly, performance can be compromised or become very expensive.
The physical security industry and end users are embracing network video surveillance in a big way. The trend is growing at a rapid pace to replace old analog CCTV and DVR systems with IP network technology when a video security system is being installed, upgraded, or expanded. Basically, operating like a computer that sees, IP […]
By Keith Townsend Last month’s large distributed denial of service (DDoS) attack on Dyn, Inc., highlighted security vulnerabilities presented by the Internet of Things (IoT). Even if you don’t believe your company’s IoT devices are important, they can be valuable assets to a hacker seeking to create a botnet. Take steps to secure them ASAP.
by Taylor Armerding It may seem very appealing to fight fire with fire after a cyberattack, but doing so may only get you into more trouble. A group of experts discussing international economic espionage came to the conclusion that hacking back could result in unintended negative consequences.
by David Goldman A big problem with antivirus and antimalware tools is the false sense of security that they provide. A new system from Microsoft aims to alert users and IT departments if a hack occurs—it may seem a little reactive, but isn’t it better to know about the problem so it can be fixed […]