According to an electronic filing, an unidentified American power company has reached a settlement to pay a $2.7 million penalty over significant security flaws that could have allowed hackers to gain remote access to their systems.
- By Jessica Davis
- Mar 15, 2018
President Donald Trump announced via Twitter that Gina Haspel would be taking the place of Mike Pompeo.
- By Sydny Shepard
- Mar 14, 2018
Technology marches ever forward, lockstep with ‘Moore’s Law.’ However, the influx of technological change affects different industries in different ways.
- By Andy Newbom
- Mar 14, 2018
ISC West attendees are invited to visit Open Options at booth #3103 to learn about the latest features in the DNA Fusion platform, including FlexAPI, Open Options’ application programming interface, OpenDX database exchange software, and DNA Fusion’s Mobile and Web applications.
New Expansion Satisfies Growing Client Needs Across South Central Texas
President Trump unveiled a school safety plan on Sunday.
- By Sydny Shepard
- Mar 13, 2018
Community Professional Loudspeakers is pleased to announce the appointment of Paul Peace as Senior Director of Engineering.
Entities need to understand why these attacks are so common and how to combat them.
- By Dena Bauckman
- Mar 12, 2018
The Transportation Security Administration must shift their focus away from checkpoints and toward public, less-strictly secured areas of airports in order to adapt to changing threats, according to the agency’s new chief.
- By Jessica Davis
- Mar 09, 2018
One student was killed and a second was injured Wednesday afternoon in what was called an accidental shooting at Huffman High School in Birmingham, Alabama, authorities said.
- By Jessica Davis
- Mar 08, 2018
The new licensing program is called BlackBerry Secure and aims to protect devices with BlackBerry security technology.
The FBI gives basic steps to mitigate the threat of W-2 theft.
- By Sydny Shepard
- Mar 08, 2018
For the first time in two decades, Tennessee is boosting security standards for courthouses across the state.
- By Sydny Shepard
- Mar 07, 2018
The European Union will begin to enforce strict data security starting in May. Here's what you should know.
- By Sydny Shepard
- Mar 07, 2018
With this award, SIA honors Marcella for his work in strengthening education programming for the security industry through SIA Education.
Proactive data monitoring plays a critical role in securing sensitive business information.
Cybersecurity was found to be the top technology used by healthcare facilities.
- By Sydny Shepard
- Mar 06, 2018
One of the ten attacks can create "artificial choas" by sending a fake emergency alert to cell phone users.
- By Sydny Shepard
- Mar 06, 2018
A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.
- By Sydny Shepard
- Mar 05, 2018
The suspected shooter is still at large, and is considered to be armed and dangerous.
- By Jessica Davis
- Mar 02, 2018
Securitas has agreed to acquire the division Kratos Public Safety and Security from Kratos Defense & Security Solutions, Inc. The purchase price is approximately MSEK 550 (MUSD 69) on a cash and debt-free basis. The acquisition is expected to be neutral to Securitas earnings per share in 2018 and 2019, and accretive as of 2020.
The growth of technology is everywhere. What’s next for the security industry? I think the next innovation poised to transform the security industry will be deep learning or artificial intelligence (AI), which is a system that learns by looking at masses of data.
- By Ralph C. Jensen
- Mar 01, 2018
Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.
- By Mark Clifton
- Mar 01, 2018
When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.
- By Peter Boriskin
- Mar 01, 2018
The safety and security of visitors and staff and the protection of the Musical Instrument Museum's extensive collection is an essential aspect of fulfilling its mission. With an active facility during both day and evening hours, the museum sought to upgrade its outdoor security surveillance system to improve the quality of the images around the clock.
- By Sydny Shepard
- Mar 01, 2018
The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses.
- By Mohammed Murad
- Mar 01, 2018
Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.
- By Joe Morgan
- Mar 01, 2018
It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.
- By Shawn Guan
- Mar 01, 2018
The security landscape is constantly evolving with new products and technologies. With the introduction of these new and improved technologies, it is inevitable that products which have existed within the industry for years may no longer be the go-to choice when it comes to selecting system equipment.
- By Roscoe Coffman
- Mar 01, 2018
The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.
- By Courtney Dillon Pedersen
- Mar 01, 2018