Nearly 1/3 of moviegoers in America are willing to endure metal detectors and pat downs to ensure a safe movie experience.
- By Ginger Hill
- Aug 07, 2015
A 38-year-old St. Louis woman was taken to a hospital for psychiatric observation on Wednesday after talking her way past airport security and entering the cockpit of a private plane.
- By Matt Holden
- Aug 06, 2015
Provides common video interface for a wide range of vertical market applications.
Recent hacks expose personal information about millions of people.
- By Alison May
- Aug 06, 2015
Internet-connected vehicles becoming target for tech-savvy cyber criminals.
- By Ginger Hill
- Aug 05, 2015
Windows 10 features a number of security updates and settings that are important to know, even if you didn’t read the fine print.
- By Matt Holden
- Aug 05, 2015
Seamless integration between Pelco’s powerful and intuitive VideoXpert Video Management System and the comprehensive suite of video analytics capabilities of Agent Vi’s savVi software delivers rapid results and an unparalleled user experience.
Security Center unifies security operations across waste and water facilities, police and fire departments, city hall, libraries, park and recreation buildings, public works facilities, the regional airport and others.
New technology, listings, training and software expand dealer support and offer more solutions for traditional and non-traditional applications.
Merger produces the largest U.S.-owned security company.
Protection 1 Team Members Volunteered at Local Organizations across the Country for “All for 1 Day."
Symmetry CompleteView VMS and Symmetry PowerProtect NVRs offer faster processes, performance gains and increased storage.
New location to support rapid market growth, tap into area’s engineering expertise.
Some public Wi-Fi hotspots are provided by con artists.
- By Matt Holden
- Aug 04, 2015
Recreational drones could be used by adversaries to attack the United States.
- By Ginger Hill
- Aug 04, 2015
Intersecting business into the professionalization of information security debate.
- By Martin Zinaich
- Aug 04, 2015
Gun violence became a personal issue due to Lafayette, Louisiana movie theater shooting on July 23, 2015 during the movie Trainwreck.
- By Ginger Hill
- Aug 03, 2015
The funding was led by TPG Growth.
- By Matt Holden
- Aug 03, 2015
5 steps to help professionalize the cybersecurity workforce.
- By Martin Zinaich
- Aug 03, 2015
In recent years, the cruise industry has received a lot of attention from the news media regarding serious security issues onboard its vessels, ranging from people falling overboard to sexual assaults.
- By Jumbi Edulbehram
- Aug 01, 2015
Technology is amazing stuff. However, some of the greatest threats that today’s businessman or woman faces is a cyberattack. Just count the number of breaches in the last couple of years; you know what I mean.
- By Ralph C. Jensen
- Aug 01, 2015
With the increased focus on home automation and associated “smart home” devices, it is incumbent on security dealers, installers and integrators to do more than simply sell security products.
- By Larry Goldman
- Aug 01, 2015
Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.
- By Mitchell Kane
- Aug 01, 2015
Today, Dedicated Micros continues to conceptualize and develop ground breaking video surveillance solutions to meet industry needs.
- By Neil Robertson
- Aug 01, 2015
Those words are often associated with the real estate industry, but the security community can also apply that mantra to the all-important issue of camera placement for optimizing analytics.
- By Ian Westmacott
- Aug 01, 2015
A large corrections campus encompassing more than 30 buildings in the southeast United States houses approximately 5,000 inmates with separate jail facilities for men and women who are awaiting sentencing, serving sentenced jail time and are in maximum security.
- By Ralph C. Jensen
- Aug 01, 2015
With the move to a mobile- and cloud-first world, corporate data has become increasingly difficult to protect.
- By Tim Phipps
- Aug 01, 2015
Walking the expo floor at the most recent RSA conference, it was hard to miss how many companies were talking about big data.
- By Jonathan Sander
- Aug 01, 2015
I wouldn’t consider myself an extremely religious man, but I do go to church on a weekly basis, and I do expect my presence in the church to be safe and secure.
- By Ralph C. Jensen
- Aug 01, 2015
Perimeter security: Just the words conjure-up visions of horror.
- By Dale Climie
- Aug 01, 2015