The phrases critical communications and crisis communications are used interchangeably. However, they are synergistic building blocks.
- By Jeffrey A. Slotnick
- Sep 01, 2016
Axis Communications and Canon Inc. announced today an agreement under which the two companies would change their sales and marketing efforts in major regional markets worldwide.
For most startup companies, paying for security management may not be a possibility. Budget constraints, business plans and other factors can lead to security taking a backseat to a company’s long list of other priorities.
- By Lindsay Page
- Sep 01, 2016
The recent disappearance of Egypt Air Flight MS804 on May 19 has once again highlighted the issues of insider threat at airports.
Company to provide discount on residential security services for members of prominent non-profit.
Joint Base Andrews in Maryland has been placed on lockdown following a report of an active shooter.
- By Sydny Shepard
- Jun 30, 2016
Each of these four key components are essential in establishing a solid defense against would-be cyber-attacks.
- By Gabby Nizri
- Jun 29, 2016
41 died and more than 230 more were injured when three men open fired and set off explosives at a Turkish airport.
- By Sydny Shepard
- Jun 29, 2016
Second Annual Security Industry Softball Game Scheduled for August 20.
Monitronics donated $20,000 in security hardware and monitoring to the Agape Women’s Shelter, including new professionally-installed, monitored security systems throughout the shelter and in all of the residents’ homes.
Intel could never make full use of the McAfee business, which it bought in 2010.
- By Sydny Shepard
- Jun 27, 2016
IdentiSys Inc. has been named one of the Top 150 Workplaces
in Minnesota by the Star Tribune.
At least 10 were injured when a white supremacist group and counter-protesters clashed at a rally on the Sacramento Capitol steps Sunday, June 26.
- By Sydny Shepard
- Jun 27, 2016
It was critical for Ripon to deploy a comprehensive safety and security program that streamlined access management across the expansive campus.
German police shot and killed a rifle-wielding man Thursday after he open fired in a movie theater and took hostages.
- By Sydny Shepard
- Jun 24, 2016
Automation and data solutions provider uses ID cards in an innovative way.
- By Julie Kuepers
- Jun 24, 2016
DDoS attack prevention is nearly impossible: it’s difficult to track down hackers, whereas it’s easy and inexpensive to launch a DDoS attack.
- By Dave Larson
- Jun 24, 2016
Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.
- By Sydny Shepard
- Jun 23, 2016
Dortronics today announced that Skip Burnham has joined the company to fill the newly created position of coordinating sales efforts through architects, engineers and specifiers.
A security firm analyzed open security cameras and concluded which U.S. cities have the most unsecured cameras in use.
- By Sydny Shepard
- Jun 22, 2016
If Britain decides to leave the European Union, British airports may see a slump in security.
- By Sydny Shepard
- Jun 22, 2016
Schools, law enforcement and other institutions to experience first-hand the benefits and ease-of-use of cutting-edge audio analytics technology.
Australian Olympian, Liesl Tesch, was mugged outside the athlete accommodations in Rio.
- By Sydny Shepard
- Jun 21, 2016
Under the latest 2016 edition requirements for Fire System Monitoring has changed drastically. The three options to keep current for fire system monitoring are two telephone lines requiring special, site specific AHJ approval; a single phone line plus another independent form of communications, or a Sole Path Fire Communicator or Equivalent.
Orlando Police and FBI released information about the sequence of events during the shooting that killed 49 and injured 53 more.
- By Sydny Shepard
- Jun 20, 2016
Acer has admitted to a data breach that affects more than 30,000 customers.
- By Sydny Shepard
- Jun 20, 2016
While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.
- By Eric Aarrestad
- Jun 20, 2016
Father’s Day is just around the corner; give Dad the gift of security with one of these products.
- By Sydny Shepard
- Jun 17, 2016
Next-Generation IDIS Solution ensures robust safety and security environment for both patients and staff.
British Politician Jo Cox was attacked on June 16 in Birstall. She later died of her injuries.
- By Sydny Shepard
- Jun 16, 2016