Washington state’s new cannabis-tracking system was hacked the weekend of Feb. 3, according to the Washington State Liquor and Cannabis Board (WSLCB). Among other information, the hacker stole route information associated with four days of marijuana deliveries.
- By Jessica Davis
- Feb 12, 2018
Relatively new on the market, the iKeyp is a smart safe for everyday use. It is simple to install and easy to connect with via the app on your smartphone.
- By Ralph C. Jensen
- Feb 12, 2018
Beginning in July with the release of Chrome 68, Google Chrome will mark all HTTP sites as “not secure”. The Chrome browser already displays a green lock icon and “Secure” sign in the URL bar for HTTPS-encrypted websites.
- By Jessica Davis
- Feb 12, 2018
You’ll get a real kick out of this security story. It is all about a secure perimeter and access control that is stored in the cloud and a man devoted to those around him.
- By Ralph C. Jensen
- Feb 12, 2018
Ideal for customers seeking an easy to use end-to-end video surveillance solution, WAVE is highly customizable and can create tailored network video solutions for any type of project, on any device.
Consumer Report says its testing found that Roku devices and Samsung Smart TVs have security flaws that make them vulnerabilities to hackers.
- By Sydny Shepard
- Feb 09, 2018
The new university app feature, called Safewalk, expands on an already existent BYU program to enable police to track students’ locations through their smartphones and virtually “walk” with students through campus and the student housing areas.
- By Jessica Davis
- Feb 08, 2018
High acceptance among various verticals including mobile banking and financial services owing to rising security concerns has enhanced biometrics market size.
Leading Connecticut-based turnstile manufacturer starts the year off in the right direction by making it easier for architects & engineers to specify Aeroturn’s solutions.
Soldiers have taken on the work of guarding Pyeongchang's ice area ahead of the Winter Olympics' Opening Ceremony.
- By Sydny Shepard
- Feb 07, 2018
The word "ransomware" has been recognized by the Oxford English Dictionary.
- By Sydny Shepard
- Feb 06, 2018
Security personnel will be on the lookout for suspicious drones during the Winter Olympics in South Korea.
- By Sydny Shepard
- Feb 05, 2018
The importance of cyber security insurance, and how businesses can increase their privacy to protect themselves against hackers.
Motorola Solutions has acquired Avigilon.
- By Ralph C. Jensen
- Feb 02, 2018
The Tend Lynx Indoor Camera doesn’t look like much, but its multi-use functionality make it a great option for DIY security beginners.
- By Sydny Shepard
- Feb 02, 2018
Like many gaming venues, the lighting scheme at the Hard Rock Hotel & Casino in Tulsa, Okla., focuses on creating an atmosphere of fun and excitement.
- By Chris Cavey
- Feb 01, 2018
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility.
- By Ralph C. Jensen
- Feb 01, 2018
Cybercrime is a large and dangerous business and it impacts individuals, businesses and governments worldwide.
- By Jennifer Hackenburg
- Feb 01, 2018
Providing independent consulting, best-inclass
products, hosting solutions and financial
services to more than 1,000 U.S.- and
Canada-based companies, Forsythe is one
of the largest independent IT integrators in
North America.
- By Howard Carder
- Feb 01, 2018
Commerce Tower on Main, in Kansas City, Mo., is redefining downtown apartment living by creating an energy-efficient, vertical neighborhood with luxury apartments, exclusive amenities and a connected lifestyle.
- By Howard Carder
- Feb 01, 2018
Empresa Eléctrica de Guatemala (EEGSA Group) required a video surveillance system that could digitize the security footage on its substations to help avoid damage to its own infrastructure as well as electrocution hazards for people trying to access these places without warning or authorization.
- By Courtney Pedersen
- Feb 01, 2018
I read a recent news story I wanted to share and make aware of the ramifications. After nearly disappearing in the 1990s, the spread of child sexual abuse material exploded with the rise of the internet, while child sex trafficking increased with exposure to a greater market online. Today, the problem is complex and still growing.
- By Ralph C. Jensen
- Feb 01, 2018
Operating in more than 4,000 buildings, one of the largest U.S. banks could not keep up with the onboarding and off-boarding of 300,000-plus employees, contractors, vendors and visitors.
- By Kim Rahfaldt
- Feb 01, 2018
Like it or not, every time you spend time on the keyboard, there may be someone watching your every keystroke. It wouldn’t hurt if you knew your enemy; and it certainly would be beneficial if you knew who was on your side.
- By Ralph C. Jensen
- Feb 01, 2018
Information security is defined as a reactive activity, as it involves managing risks that may have a serious effect on the organization if they occur.
- By Csaba Krasznay
- Feb 01, 2018
Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis.
- By Jonathan Lewit
- Feb 01, 2018
Data storage is becoming a hot topic in the video surveillance industry and gaining more attention as retention periods continue to increase.
- By Eric Polet
- Feb 01, 2018
Making changes to an existing product is more than adding a tweak here and a new feature there.
- By Bruce Czerwinski
- Feb 01, 2018
Standalone systems, where certain access points are equipped with card readers but are not connected to a larger network, can provide a cost-effective access control solution.
- By Gordon Holmes
- Feb 01, 2018