One of the campus’s current projects is the renovation and expansion of the Rietz Student Union that prompted the discovery of several ‘dead zones’ in the outdoor notification program.
- By Molly Walsh
- Nov 01, 2015
Physical security administrators and IT departments have both gotten much more involved with each other in system deployment decisions, ever since video surveillance first began transitioning from analog to network cameras.
- By Brandon Arcment
- Nov 01, 2015
There are many challenges associated with securing Specialized including theft protection and loss prevention, general security for employees, and protecting the company’s highly confidential trade secrets which are safeguarded at headquarters.
- By Taylor Foster
- Nov 01, 2015
This is a story of lens selection gone wrong, and right. Often it seems lens selection is not given much attention, and at worst is an afterthought.
- By Andrea Iniguez
- Nov 01, 2015
This month I ventured out just a little bit to talk about residential security, though much of what I learned also applies to commercial and industrial security. No better place to learn about software than Silicon Valley.
- By Ralph C. Jensen
- Nov 01, 2015
Employee mustering at industrial sites or large facilities has typically been difficult to efficiently manage due to the complexity of the situation and human factors.
- By Steven Pisciotta
- Nov 01, 2015
This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.
More than a decade ago, the talk was all about convergence. Well, the industry has converged, but there is now something more interesting on the horizon.
- By Ralph C. Jensen
- Nov 01, 2015
According to several studies, growth is now focused on “self-installed” products that piggyback on the popularity of smart phones and the tech-savvy millennials that use these devices for everything from banking to prepared food delivery.
- By Bart Didden
- Nov 01, 2015
Imagine getting slapped with a $1 million fine for not adequately securing your facility. Think it can’t happen? Think again.
As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches. But, did you know that even your best-protected clients may face an even greater threat than poorly managed networks and systems?
- By Ryan Corey
- Nov 01, 2015
Waco PD releases the video from inside the restaurant and patio on the day of the shootout that left 9 dead.
- By Sydny Shepard
- Oct 30, 2015
Sharad Shekhar has been named the newest CEO for Pelco by Schneider Electric.
- By Sydny Shepard
- Oct 30, 2015
Poor security habits from employees could lead to a cybersecurity breach.
- By Sydny Shepard
- Oct 29, 2015
Company's security system placed on GSA Approved Products List 2.
- By Sydny Shepard
- Oct 29, 2015
SureView Systems partners with integration firm to create easy-to-use platform for customers.
- By Sydny Shepard
- Oct 28, 2015
Cisco's acquisition of Lancope predicted to boost Cisco’s cybersecurity threat defense capabilities.
- By Sydny Shepard
- Oct 28, 2015
USA affiliate Andrews International acquires Entourage Security Management as a way to expand overseas.
- By Sydny Shepard
- Oct 27, 2015
An officer is under investigation after the violent arrest of a high school student.
- By Sydny Shepard
- Oct 27, 2015
A campus security email said that a New Jersey City University staff member has his wallet stolen by three juveniles.
Four dead and many more injured after a car crashes into parade audience.
Milestone Systems' open platform IP video management software (VMS) is the flexible foundation for continuing expansion by the Mission Consolidated Independent School District (Mission CISD) in South Texas.
Kee will oversee warehouse operations, corporate training, IT and technical support.
One person was shot and killed at Tennessee State University Thursday night.
Is security on board the answer to the high rise in incidents on planes?
Are you sure your home is safe enough?
State issued identification cards from four states will no longer be accepted for domestic flights starting in 2016.
The University of Phoenix is now accepting applications to award ten full-tuition scholarships.
Some of technologies leading revolutionaries disregard the Cyber Security Bill as a legitimate solution to the data breaches seen in recent news.