Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!
- By Ginger Hill
- Oct 16, 2014
Compact in size, features HD 720p, real-time video with motorized pan and tilt.
Helps security dealers boost RMR and reach new markets
while expanding connected home and business offerings with GPS vehicle and asset tracking.
Calculator joins growing number of company's helpful online tools.
Second Netflix pilot follows HID Global’s and RFI’s successful initial Netflix project, and takes mobile access control to the next level of security and convenience.
Company introduces 360-degree technology to local dignitaries and more than 120 businesses.
The company is urging users to enable two-step authentication.
- By Matt Holden
- Oct 15, 2014
Banks already using Facebook and Twitter to allow customers to transfer funds.
- By Ginger Hill
- Oct 14, 2014
Ice Cable Systems new smart packaging makes great first impression while benefiting the installation process.
Provides transportation agencies with comprehensive oversight across entire operation on transit vehicles and in stations, depots and park-and-rides.
Integrates long range reading with increased device control in leading proximity or contactless smart card technologies.
The hackers are targeting the Ukrainian government, a European government agency, two European companies and a United States scholar.
- By Matt Holden
- Oct 14, 2014
All 11 member companies are selling this cloud-based, Wi-Fi video monitoring camera.
Tyson to assume presidency; Chase to join Board Management Committee.
In honor of National Cyber Security Awareness Month, these not-so-familiar tips will help keep you safer online.
- By Ginger Hill
- Oct 10, 2014
The court ordered Google to remove results of a man’s unflattering past.
- By Matt Holden
- Oct 10, 2014
Social media giant feels First Amendment right has been violated.
- By Ginger Hill
- Oct 09, 2014
With biometric sensor directly on the card, organizations can also leverage legacy proximity card readers to add biometric authentication.
Featured products and solutions met and exceeded market demands for security, connectivity, locking and access control.
The camera includes a 16MP sensor but lacks a viewfinder
- By Matt Holden
- Oct 09, 2014
Employees must stand in line, waiting to be screened before they are allowed to leave the premises.
- By Ginger Hill
- Oct 08, 2014
The security and storage company looks to split the two categories into separate organizations.
- By Matt Holden
- Oct 08, 2014
IP protection added, revolutionizing how access control systems are deployed and managed.
Marco brings extensive sales and marketing experience.
Powered by Seos and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.
Cooperative effort leverages RTTG's expertise in developing and hosting advanced identity management programs.
With over 600 exhibitors and over 20,000 attendees, security knowledge was floating around Atlanta’s Georgia World Congress Center
- By Ginger Hill
- Oct 08, 2014
I understand that parts of the security industry are rather “hush-hush,” and can’t and shouldn’t be discussed openly; however, it seems that the security industry as a whole is coming out of its shell a bit, at least on social media platforms, Twitter in particular.
- By Ginger Hill
- Oct 08, 2014
No one would argue a lot of work goes into a tradeshow. I marvel at all the exhibitors and the lengths they go to, to ensure a successful three-day event.
- By Ralph C. Jensen
- Oct 08, 2014
Allows resellers and customers to have a reference tool for all aspects of the card ordering process.