Wireless Networks


Hytera US Inc Launches the PNC560 Handheld Smart Computer, Scanner, and PoC Radio All in One Device

Hytera, a provider of innovative communication solutions, announces the launch of the Hytera PNC560, a groundbreaking Push-to-Talk over Cellular (PoC) radio, handheld smart device, and scanner designed to revolutionize nationwide business operations and remote workforce communications. PoC provides instant and secure nationwide communications at the push of a button.

Wi-Fi HaLow and the Evolution of the Smart Home

Wi-Fi HaLow and the Evolution of the Smart Home

From those early, high-pitched days of dial up, to the impending arrival of Wi-Fi 7, connectivity is changing… particularly in the Wi-Fi department.

Cashing in on Your VMS System

Cashing in on Your VMS System

In banking today, the FBI and Federal Deposit Insurance Corp. (FDIC), have mandated security standards that require a minimum number of cameras and camera resolution in each facility.

The Future of Industrial Security

The Future of Industrial Security

In the new world of modern industrial networking solutions, the security measures to protect a network must match the pace of innovation across many industries, including mining, oil and gas, agriculture, transportation, heavy construction, military, municipalities, and government.

Cutting the Cord

Cutting the Cord

Long before anyone coined “Internet of Things,” the security industry began to lay the foundations for what would become the 21st century smart home.

WiFi and Cellular are Key Partners in a Secure Hybrid Workplace

WiFi and Cellular are Key Partners in a Secure Hybrid Workplace

COVID-19 has been with us long enough that organizations are acknowledging that home and office will combine to create the new workplace. Commonly referred to as the “Hybrid Workplace,” the expectation is that while employees may work predominantly in one place or another, over time, both the remote and office locations will play a role in enabling a productive, engaged workforce.

Today’s Essentials

Many of today’s video security systems feature 4K HD video to help human operators monitor and react better, but also to provide the best possible raw video data for the AI and machine learning programs that are used to continuously enhance operations.

The Rise and Sophistication of Mobile Apps in Physical Security Sector

Safety and security risks are everywhere including the office, schools, concerts, retail malls and hospitals. However, security professionals, who are tasked with protecting the public, can’t be everywhere at all times and they require timely information in order to prevent potential incidents.



Wireless Networked Access Control Helps Business, Multi-family

PDQ Manufacturing, located in Lancaster, PA, is announcing the release of pdqSMART, designed to bring more security to access control. The pdqSMART-XLS business solution offers mobile centric bluetooth access control; lock/unlock from a smartphone.

online training graphic

Making the Best of a Challenging Situation: Engaging Employees Through Training

By helping employees to feel productive and sharpen skills through training, ADT Commercial has hit upon an innovative way to ease collective stress during uncertain times.

who flag

World Health Organization Sees Dramatic Uptick in Cyber Attacks

Nearly 450 active email addresses and passwords used by WHO staff have been leaked online, and the public has received email scams from people posing as staff.

devops globe

Top Eight Methods to Secure DevOps Pipelines

In order to address vulnerabilities and risks, security teams must enable privileged access management and automate security tools, among other tips.

Capitol Hill at sunset

Industry Groups Push For More Cybersecurity Funding In Future COVID-19 Stimulus Legislation

With high numbers of ransomware attacks and increased threats due to teleworking, advocacy groups want Congress to prioritize cybersecurity funds to local and state governments.

new york capitol

New York State Responded to Cyber Attack on Government Servers Weeks Before Coronavirus Pandemic Hit

Officials handled an attack that disabled access to state agency databases just a few weeks before the state became the epicenter of the COVID-19 crisis.

5G cell tower

New Government Strategy for 5G Security Sets Stage for Domestic Rollout

Franco Zaro of Valid breaks down new government efforts to establish a 5G security strategy and public paranoia about the wireless infrastructure.

google coronavirus

Apple and Google Team Up For Coronavirus Tracing App, Sparking Privacy Concerns

The app will make it easier for individuals and public health officials to track the spread of COVID-19, but privacy rights groups are pushing for transparency.

zoom phone

Video Conferencing Software Zoom Faces Scrutiny Over Hacks, Abusive Behavior During Meetings

The spread of “Zoombombing,” or hijacking a meeting room with abusive images or speech, has grown in scope as more Americans turn to teleconferencing for classroom instruction and workplace meetings.

cybersecurity map

Facing Down Cybersecurity and Operational Challenges Caused By Coronavirus Crisis

Businesses will have to tackle issues with supply chains and staffing in the coming months. Here’s how to make sure your organization can withstand the COVID-19 crisis.

people using phones

Israel Moves to Track Cell Phone Location Data To Prevent Spread of Coronavirus

The U.S. and tech companies are contemplating a similar step, though the American version of cell phone tracking would likely include aggregated data and more privacy protections.

internet of things

How Ready are IT Professionals for Attacks on IoT Devices?

Less than half of cybersecurity professionals are prepared for cyber attacks on their own IoT devices, according to one study.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3