A VPN creates an encrypted connection between your device and the remote private network.
Florida hospitals install new security protocols aimed at visitor management.
- By Sydny Shepard
- May 09, 2018
The Philadelphia Phillies are improving security around Citizen Bank Park with perimeter protection devices.
- By Sydny Shepard
- May 09, 2018
Utility companies in Washington State are boosting security after placing a moratorium on cryptocurrency miners.
- By Sydny Shepard
- May 08, 2018
A bug in the Twitter system caused people's passwords to be kept unmasked in an internal log.
- By Sydny Shepard
- May 07, 2018
Leading Long Island systems integrator continues growth pattern and expands sales and marketing team.
Officials said in an arrest affidavit that the suspect had talked online with an FBI source beginning in December 2017 and told the informant that he wanted to carry out a terrorist attack. He mentioned to the FBI source that he’d considered traveling to Pakistan and crossing the border into Afghanistan to join the Islamic State.
- By Jessica Davis
- May 03, 2018
What if we could listen in on network traffic instead of just looking at it on graphs?
- By Sydny Shepard
- May 03, 2018
Security researchers found that certain models from Volkswagen could be hacked and remotely controlled.
- By Sydny Shepard
- May 02, 2018
The University of Texas has stepped up its safety and security following violent incidents on campus.
- By Sydny Shepard
- May 02, 2018
There are a lot of amazing things to say and write about Allied Universal. For starters, these security professionals are headlong into predictive analytics, and WOW, what a difference it makes in providing security services to the customer.
- By Ralph C. Jensen
- May 01, 2018
The true promise of the Internet of Things in the physical security space is that connected, network-enabled products will simplify both life and work, make companies more profitable, and provide better solutions than could be achieved through non-IoT products.
- By Peter Boriskin
- May 01, 2018
With society facing new challenges, such as the changing nature of crime and pressure on police time, our cities are being forced to update their security responses to ensure they remain safe.
- By Peter Jones
- May 01, 2018
Talk about intensity, Aeroturn engineers have found a new passion for developing turnstiles. In fact, they treat everything they do as if it is the only thing they do.
- By Ralph C. Jensen
- May 01, 2018
These days you hear a lot about the use of surveillance equipment is all avenues of life from banks to airports to your front porch, but a significant area that can often be overlooked is the agricultural, livestock and wildlife industry.
- By Jennifer Hackenburg
- May 01, 2018
Whether you’re a government, corporate or nonprofit organization the enemy of security operation is surprise. Surprise causes losses: losses in revenue, losses in operational agility and even loss of life.
- By John Goolgasian
- May 01, 2018
The adoption of IP-based video surveillance cameras is driving the growth of the overall video surveillance market.
- By Dennis Troxel
- May 01, 2018
Thousands of people pour into and out of high-rise office buildings each day, and each must be kept safe and secure.
- By Mark Robinton
- May 01, 2018
In Sinaloa, Mexico, the state’s government views enhancing public safety and security as priority number one. Sinaloa’s climate and terrain are perfect for supporting its booming agricultural and industrial economy, and this prosperity is dependent on effective law enforcement efforts that combat the influence of powerful drug cartels entrenched within the region.
- By Margie Gurwin
- May 01, 2018
A security camera is much more than a security camera when it’s part of an analytics infrastructure that serves completely new goals, advancing the organization and management of businesses and even entire cities.
Smartphones fulfill many needs, including telephone, camera, navigation, music, video, clock, news, calculator, email, internet, gaming, contacts, and more.
- By Scott Lindley
- May 01, 2018
When we talk about government security, the first thoughts are of the federal government. It is true that the federal government is bloated and somewhat mismanaged, but let’s talk about security on the grander scale; safe cities and even safer schools.
- By Ralph C. Jensen
- May 01, 2018
In 1970, intercoms were all about convenience. They made it easy for secretaries to communicate with their boss and for company employees to connect between offices within the same building.
- By Ralph C. Jensen
- May 01, 2018
While the security industry is being sold on UPS battery back-ups that come with “power conditioning” built in, the reality is that over 90 percent of these battery back-ups only offer surge suppression and surge suppressors that solely protect against large power fluctuations, such as lightning, which only account for two percent of failures.
- By Vincent DeMaio
- May 01, 2018
Most of the malicious or criminal activity targeting today’s enterprises involves the endpoint. Insecure endpoints are an expensive risk and difficult to address.
- By Richard Henderson
- May 01, 2018
Connected or smart devices in or on buildings, vehicles, and even people include software, mobile apps, sensors, and network connectivity used to collect and exchange data.
- By Christa Miller
- May 01, 2018