The suspect in the Austin bombings detonated a bomb in his car as officers closed in.
- By Sydny Shepard
- Mar 21, 2018
UT Austin, Austin Country Club and the neighborhoods in the area are boosting security following the serial bombings.
- By Sydny Shepard
- Mar 21, 2018
Brent awarded for leading collaborative efforts and leading SIA International Relations Committee.
Police in southern Maryland are responding to a call at Great Mills High School were several people have been injured in a shooting.
- By Sydny Shepard
- Mar 20, 2018
According to cybersecurity firm Kromtech, who found it stored in a publicly accessible Amazon S3 bucket.
- By Sydny Shepard
- Mar 20, 2018
Package bombs left on porches in Texas have killed two people and wounded two more.
- By Sydny Shepard
- Mar 19, 2018
Connected devices at home can record the voices, movements, weight and eating habits of those who live there. They are, in effect, very sophisticated sensors installed in the home environment. As such, they can be utilized by all sorts of people with various motivations and intentions of harming us.
- By Yotam Gutman
- Mar 19, 2018
A gunshot-detection system hailed by the Pittsburgh police is poised to cover nearly a third of the city this year.
- By Sydny Shepard
- Mar 19, 2018
Google released its fourth annual review for Android security. Here are the highlights.
- By Sydny Shepard
- Mar 16, 2018
A teacher accidentally discharged a firearm while teaching a public safety class at a Northern California school on Tuesday, according to police.
- By Jessica Davis
- Mar 15, 2018
According to an electronic filing, an unidentified American power company has reached a settlement to pay a $2.7 million penalty over significant security flaws that could have allowed hackers to gain remote access to their systems.
- By Jessica Davis
- Mar 15, 2018
President Donald Trump announced via Twitter that Gina Haspel would be taking the place of Mike Pompeo.
- By Sydny Shepard
- Mar 14, 2018
Technology marches ever forward, lockstep with ‘Moore’s Law.’ However, the influx of technological change affects different industries in different ways.
- By Andy Newbom
- Mar 14, 2018
ISC West attendees are invited to visit Open Options at booth #3103 to learn about the latest features in the DNA Fusion platform, including FlexAPI, Open Options’ application programming interface, OpenDX database exchange software, and DNA Fusion’s Mobile and Web applications.
New Expansion Satisfies Growing Client Needs Across South Central Texas
President Trump unveiled a school safety plan on Sunday.
- By Sydny Shepard
- Mar 13, 2018
Community Professional Loudspeakers is pleased to announce the appointment of Paul Peace as Senior Director of Engineering.
Entities need to understand why these attacks are so common and how to combat them.
- By Dena Bauckman
- Mar 12, 2018
The Transportation Security Administration must shift their focus away from checkpoints and toward public, less-strictly secured areas of airports in order to adapt to changing threats, according to the agency’s new chief.
- By Jessica Davis
- Mar 09, 2018
One student was killed and a second was injured Wednesday afternoon in what was called an accidental shooting at Huffman High School in Birmingham, Alabama, authorities said.
- By Jessica Davis
- Mar 08, 2018
The new licensing program is called BlackBerry Secure and aims to protect devices with BlackBerry security technology.
The FBI gives basic steps to mitigate the threat of W-2 theft.
- By Sydny Shepard
- Mar 08, 2018
For the first time in two decades, Tennessee is boosting security standards for courthouses across the state.
- By Sydny Shepard
- Mar 07, 2018
The European Union will begin to enforce strict data security starting in May. Here's what you should know.
- By Sydny Shepard
- Mar 07, 2018
With this award, SIA honors Marcella for his work in strengthening education programming for the security industry through SIA Education.
Proactive data monitoring plays a critical role in securing sensitive business information.
Cybersecurity was found to be the top technology used by healthcare facilities.
- By Sydny Shepard
- Mar 06, 2018
One of the ten attacks can create "artificial choas" by sending a fake emergency alert to cell phone users.
- By Sydny Shepard
- Mar 06, 2018