The ultimate guide to modern video business surveillance systems in 2021

The ultimate guide to modern video business surveillance systems in 2021

The ultimate guide to modern video business surveillance systems in 2021 | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Adapting your fraud strategy to meet customer expectations

Adapting your fraud strategy to meet customer expectations

Adapting your fraud strategy to meet customer expectations | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Future-proofing data against hackers

Future-proofing data against hackers

Future-proofing data against hackers | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Fraudsters bank on targeted, high-value attacks during 2020 holiday shopping season

Fraudsters bank on targeted, high-value attacks during 2020 holiday shopping season

Fraudsters bank on targeted, high-value attacks during 2020 holiday shopping season | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Card-Not-Present: Security Considerations for Point of Sale Businesses

Card-Not-Present: Security Considerations for Point of Sale Businesses

As the retail world’s center of gravity shifts to the cloud, payment card fraud has followed suit. According to Verizon’s retail vulnerabilities study, attacks against e-commerce applications are by far the leading cause of retail data breaches. This trend mirrors similar outcomes in other industries, like food service. A complimentary Verizon study finds remote attacks against food service operators on the rise, as well. In both industries, the swing to card-not-present (CNP) fraud has been…

Read More

How to address security fatigue and stop cybercriminals from winning

How to address security fatigue and stop cybercriminals from winning

Security fatigue and negative social influences give digital bad guys the advantage. Experts offer tips on how to solve this cybersecurity issue. Image: iStock/nensuria You may be familiar with the tech saying, “It’s not if, but when.” That saying is no longer apropos. It has been replaced with “It’s not when, but how often.” One reason for lost optimism is the uncanny ability of cybercriminals to manipulate their victims.  Troy La Huis and Michael Salihoglu…

Read More

Don’t let a data breach sink your business: Here’s what you need to know

Don’t let a data breach sink your business: Here’s what you need to know

Experts offer insights about the legal and financial hits, as well as the devastating loss of reputation, your business might suffer if it is the victim of a data breach. Image: MangoStar_Studio, Getty Images/iStockphoto The consequences of a data breach involve a complex sequence of events specific to the victimized business and its responsibilities to regulators, governments, and customers. A report from Veritas said some people believe CEOs should be held responsible for ransomware attacks,…

Read More

Terrorism and security threat trends in 2021

Terrorism and security threat trends in 2021

Terrorism and security threat trends in 2021 | 2020-12-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The top stories of 2020

The top stories of 2020

The top stories of 2020 | 2020-12-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

UK lawmakers propose law banning retail bots after PS5 fiasco

UK lawmakers propose law banning retail bots after PS5 fiasco

The legislation would both ban the resale of goods acquired using bots and the resale of tech products above the manufacturers’ price. Image: iStock/Girts Ragelis A group of lawmakers in the United Kingdom are looking to take on powerful bot organizations openly scalping gaming consoles by proposing potential legislation that would both ban the resale of goods acquired using bots and ban the resale of tech products above the manufacturers’ price.  More about artificial intelligence…

Read More
1 2,457 2,458 2,459 2,460 2,461 2,541