An active shooter situation in Toronto left two people dead and a dozen more wounded over the weekend.
- By Sydny Shepard
- Jul 23, 2018
Global research company CrowdStrike surveyed over a thousand IT decision-makers and found companies awarness to combat supply chain attacks.
- By Sydny Shepard
- Jul 23, 2018
Toronto Police hope to bolster city security with more surveillance.
- By Sydny Shepard
- Jul 23, 2018
The question is this: How can healthcare organizations protect themselves against threats when most originate from within their own walls?
- By Hoala Greevy
- Jul 20, 2018
Millions of personal data records are vulnerable after a breach was detected at LabCorp.
- By Sydny Shepard
- Jul 19, 2018
Sooner or later, a smartphone app will be able to unlock your car. But what are the potential security issues that come with this new technology?
- By Andy Allan
- Jul 18, 2018
The Crimson Tide will be introducing metal detectors to football games starting in the fall.
- By Sydny Shepard
- Jul 18, 2018
IBM Security and Ponemon Institute have released their study on the average cost of a data breach.
- By Sydny Shepard
- Jul 17, 2018
Amazon Prime Day is here! Here are the best discounts on security products.
- By Sydny Shepard
- Jul 16, 2018
Qualified security guars at North Shore University Hospitals will now be armed amid shooting incidents in New York.
- By Sydny Shepard
- Jul 16, 2018
Leading Ohio-based manufacturers’ rep firm joins forces with top security rep firm in the Great Lakes region to offer communication infrastructure, A/V and security solutions.
A threat assessment program create standards for teachers and peers to identify threats before they happen.
- By Sydny Shepard
- Jul 13, 2018
Provides integrators with greater flexibility and efficiency
- By Sydny Shepard
- Jul 12, 2018
Office security is always important, but in the summer, it can get more lax.
- By Katie Torrance
- Jul 12, 2018
Whether your title is Security Director or you just have the responsibilities of one, there’s a lot riding on your shoulders.
Looking at examples of how municipalities or governments protect these assets can help businesses plan as well. Critical infrastructure for businesses often shares similar needs with municipalities: how do we best protect servers, structures and the people who live and work in private buildings?
- By Peter Boriskin
- Jul 11, 2018
Conversations about what can be done to keep violent weapons and dangerous materials from falling into the wrong hands continue to dominate the political discussion, leaving communities wondering about what they can do to prevent the next school or church attack.
- By Stephanie Douglas
- Jul 11, 2018
Even if you don’t have a Facebook account, you have undoubtedly heard the reports about how Cambridge Analytica accessed the personally identifiable information (PII) of up to 87 million users over a period of several years.
- By Christian Morin
- Jul 11, 2018
Having both specific and shared goals is what makes medical centers quite unique to security. Rarely are two buildings alike, yet they all have common needs, requirements and goals.
As with all major sporting and entertainment events, the goal is for everyone using a ticket to have purchased it from the authorized ticketing entity and to have a seamless experience both when they pick it up and when they present it at the venue.
- By Cesare Paciello
- Jul 11, 2018
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT.
Today’s facility operators must prepare for virtually any event from vandalism to a terrorist attack. With facilities ranging in size and use—from an emergency communications center to a multi-family apartment building—there’s no readily available one-size-fits-all security plan.
- By Dana Pruiett
- Jul 11, 2018
While the threat of terrorists planning to attack soft targets, such as stadiums, increases, stadium security professionals must look for the weak points throughout their facilities to determine where fanatics are most likely to assail.
With more than 120 permanent network cameras in place at Volunteer Stadium and Howard J. Lamade Stadium, Little League International works to add new technologies each year to keep the installation as secure as possible
- By Courtney Dillon Pedersen
- Jul 11, 2018
Red Hawk Fire & Security, LLC. has announced the purchase of Security and Data Technologies, Inc., (SDT) to continue extending its reach to customers in Philadelphia, and the tri-state area of Eastern Pennsylvania, Central and Southern New Jersey and Delaware.
I’m old enough to remember fire alarm drills and hiding under my desk as a youth. The fire alarm drills were great because we were able to leave the classroom and go outside. I never understood hiding under the desk, but went along with it anyway. That’s the world I grew up in.
- By Ralph C. Jensen
- Jul 11, 2018
Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.
- By Andrew Jimenez
- Jul 11, 2018
Our goal of clustering attacks on web applications is two-fold
- By Gilad Yehudai
- Jul 11, 2018
With police departments often being under budgeted and over worked, resulting in reduced patrols and delayed response, many business owners have come to expect that valuable assets stored outdoors are going to be subject to theft and vandalism, and these costs just need to be absorbed.
- By John Distelzweig
- Jul 11, 2018
As Foxwoods grew and expanded, so did the need for a state-of-theart, integrated video surveillance system to provide necessary coverage and security for the gaming facilities.
- By Michael Lohr
- Jul 11, 2018