Many professionals in the security industry today tend to use the word “turnstile” to refer to all security entrances, when, in fact, there are actually multiple types of entrances for different applications, industries and levels of security.
- By Greg Schreiber
- Nov 01, 2017
A recent data security report, published by Thales, revealed that 62 percent of all retailers worldwide have experienced a data breach within the past year.
- By Miguel Gracia
- Nov 01, 2017
As more of our lives move online, crime has unfortunately migrated to the internet at matching pace taking form in what’s now considered cybercrime.
- By Andrew Deen
- Nov 01, 2017
hile video surveillance may get all the attention—what with the stunning sharpness of 4K, the immersive experience of panoramic sensors and see-through-the-night capabilities— for most security projects, the door access control solutions are among the most important.
- By Geoff Kohl
- Nov 01, 2017
Ransomware attacks are becoming infamous. As I write now, the Petya attack is unfolding.
- By David Wagner
- Nov 01, 2017
Charity Run Raises More Than $36,000 and Provides 600 Local Elementary Students with Book Bags
New industrial microSD cards designed for commercial and enterprise surveillance deliver cost savings, ease system design and speed deployments
This year has been filled with some of the biggest data breaches in history, which is a truly horrific thought.
- By Tyler Reguly
- Oct 31, 2017
When you can secure the building at night, you can open your business for a lucrative tomorrow.
- By Sean Nolan
- Oct 31, 2017
How researching and investing in these three technologies will change your business
- By Todd Kleperis
- Oct 30, 2017
Just because Halloween is here doesn't mean you have to throw security out the window.
- By Sydny Shepard
- Oct 30, 2017
Officers welcome Ministry of Justice's new measures for England and Wales, including trial of incapacitant spray.
- By Sydny Shepard
- Oct 27, 2017
Without these online tools, your business could be vulnerable to cyberattacks risking the information of your employees and customers.
- By Sydny Shepard
- Oct 27, 2017
Paxton Access has added significant additional headcount to its team of security and technology experts.
“At Legrand, we feel a strong sense of responsibility to assist in the recovery efforts of the many unfortunate natural disasters that have occurred in our country."
The IDIS DR-1204P offers a stylish, modern form factor and all the benefits and scalability of the IDIS DirectIP™ end-to-end solution
Dual Output Power Supply Charger Provides a Host of Features
New "security interviews" to begin for fliers on U.S. bound flights.
- By Sydny Shepard
- Oct 26, 2017
A student and visitor were found dead in the courtyard between two dorms early Wednesday morning.
- By Sydny Shepard
- Oct 26, 2017
Kwikset and Yale Partner with Amazon Key to let services and couriers into your home.
- By Sydny Shepard
- Oct 25, 2017
Houston Police, federal security agencies and surrounding security professionals will have to overcome challenges to keep Minute Maid Park safe and secure.
- By Sydny Shepard
- Oct 25, 2017
San Jose State University is reviewing their newly installed security system that includes gunshot detection and license plate readers.
- By Sydny Shepard
- Oct 25, 2017
A new ransomware called Bad Rabbit (variant of Petya) is spreading through Ukraine and Russia.
- By Sydny Shepard
- Oct 24, 2017
Experienced Rep Firm Will Serve Sielox Customers in the New England Region, New York, and North Jersey
Bank of America will start using an additional layer of authentication for online banking.
- By Sydny Shepard
- Oct 24, 2017
DIY security camera maker Guardzilla introduced a new indoor camera that gives you a complete view of your home.
SALTO Systems has appointed Gerry Rupper to the commercial sales team position of Regional Sales Manager.
Helping you be prepared if an attack happens
- By Isaac Kohen
- Oct 23, 2017
Voice activated systems are vulnerable to hacking. Researchers from Michigan have found ways to bolster their security.
The guide is an accumulation best practices for hardware, software and network security measures to minimize any unwanted intrusions or breaches.