Users can enable a feature in the preview version of Safari that lets them log in with USB-based CTAP2 sticks, which offer more stringent protection than a standard text-based password.
- By Jessica Davis
- Dec 07, 2018
The Redding Police Department is purchasing two portable security cameras to help protect property and prevent crime.
- By Jessica Davis
- Dec 07, 2018
Mozilla and ThingsCon announced Thursday the launch of the Trustable Technology Mark, designed to help customers tell if an Internet of Things-connected device is designed with strict privacy and security measures.
- By Jessica Davis
- Dec 07, 2018
New Orleans' Real-Time Crime Center has helped to solve numerous crimes over the last year.
- By Sydny Shepard
- Dec 06, 2018
The largest hospital in Houston, Texas is increasing security with the addition of two security robots.
- By Sydny Shepard
- Dec 06, 2018
Simply employing the most basic of information security rules will make you and your business more safe and secure.
he alarms act as a personal security device and emit a loud noise when triggered.
- By Sydny Shepard
- Dec 05, 2018
The names, email addresses and passwords of 100 million users of Quora have been made vulnerable.
- By Sydny Shepard
- Dec 05, 2018
The document says the Secret Service contacted three other vendors, but none were able to “provide the expertise in manufacturing lapel emblems with any type of security technology features.”
- By Jessica Davis
- Dec 04, 2018
"The company has not finished identifying duplicate information in the database, but believes it contains information on up to approximately 500 million guests who made a reservation at a Starwood property," Marriott said in a statement.
- By Jessica Davis
- Dec 04, 2018
Around the world, the shipping and logistics industry has experienced immense operational growth and development.
- By Marc Murphy
- Dec 01, 2018
What technology and industry trends should you keep an eye out for to stay ahead of the pack? In short, complex analytics are growing hotter which is made possible by the trend towards GPU co-processing.
- By Brian Carle
- Dec 01, 2018
Smart city initiatives are growing across the globe, as leaders look to increase security and intelligence across metropolitan environments.
- By Brandon Reich
- Dec 01, 2018
Hardware Security Modules, or HSMs, protect against insider and external threats by delivering confidentiality for encryption keys in a physically hardened appliance.
- By Anand Kashyap
- Dec 01, 2018
Hopemate is a small IT service provider located in the Greater Vancouver, Canada, area that brings IT support to small businesses in its community.
- By Richard Jonker
- Dec 01, 2018
Technological advancements are resulting in trends and movements that improve the quality of life and business.
- By Abhishek Iyer
- Dec 01, 2018
It’s no secret Americans like to shop online. A marketing survey showed 40 percent of U.S. internet users made purchases several times a month in 2017.
- By Dana Pruiett
- Dec 01, 2018
After spending close to 20 years in the security industry, it is always a good exercise to see what projections came through the last year and which ones we foresee in the coming years.
- By Fredrik Nilsson
- Dec 01, 2018
Since North American Video (NAV) was founded in 1995, the systems integrator has continued to build an outstanding reputation in the physical security market.
- By Ralph C. Jensen
- Dec 01, 2018
In the dealer/integrator business, recurring monthly revenue (RMR) is like finding a gold mine with several profitable veins that can be mined. RMR is an attractive means for a secondary revenue stream.
- By Ralph C. Jensen
- Dec 01, 2018
No one will argue that the network has been one of the greatest evolutions in time. Think of it, everything that you used to do by hand, you can now do via computer. Well, almost everything.
- By Ralph C. Jensen
- Dec 01, 2018
In the professional security market, the model for revenue is changing. Systems integrators are looking for revenue beyond basic sales and maintenance—especially customer-oriented addons to generate recurring monthly revenues (RMR).
- By Bud Broomhead
- Dec 01, 2018
Thanks to wireless lock technologies, cloud-based software, and smartphone/tablet integration, it is now possible to deploy a secure, manageable, and cost-effective security solution without the need for complicated and expensive infrastructure.
- By Peter Boriskin
- Dec 01, 2018
Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.
- By Jeff Whitney
- Dec 01, 2018
Before installing a networked, open-platform, VMS solution, the Port of Antwerp had a standalone DVR system with no networking capabilities and no open platform support, meaning only a limited number of camera brands were supported.
- By Courtney Dillon Pedersen
- Dec 01, 2018
When it comes to access control, it all boils down to companies trying to determine whether you are who you say you are, and whether you are authorized to access certain information. As we all know, both those are tall orders to fill.
- By Jeff Capone
- Dec 01, 2018
Radar may not be the first technology that comes to mind when discussing perimeter protection, but that is all beginning to change.
- By Gadi Bar-Ner
- Dec 01, 2018