Effort dedicated to providing protection and basic resources to children from Central American who are traveling unaccompanied to the United States.
Almost half of consumers would never use mobile payment and banking apps due to fears about the level of security on their devices, with suspicions highest in the over 55 age group.
Further validates Microsemi FPGA Security capabilities leadership, simplifies information assurance system design.
Partnership combines HID Global pivCLASS technology and ActivID Credential Management System with Eid Passport’s RAPIDGate Premier solution.
Two artists say they made the flags themselves
- By Matt Holden
- Aug 13, 2014
Code Blue’s ToolVox interfaces with the Lenel OnGuard access control security system.
iZipline embeds HID Trusted Tag Services into its cloud-based platform to eliminate counterfeiting and enhance engagement between global brands and consumers’ mobile devices.
Simultaneously support UL Commercial Wireless, and addressable and conventional devices.
Initiative aims to further protect the ONVIF brand and more preemptively monitor ONVIF’s copyrights, trademarks and logos on an ongoing basis.
Movie quotes offer great insights and knowledge to enhance the security industry.
- By Ginger Hill
- Aug 13, 2014
- By Matt Holden
- Aug 12, 2014
New incident management system to be implemented across 16 award-winning hospitals.
Both feature 4K compatibility to work with the most current high definition technology and standards.
Nest is a key element in this specialty product distribution network’s portfolio of best-of-breed wireless technologies that help integrators tap new and/or previously unforeseen revenue opportunities within the home
Department of Justice is upholding 2003 ruling from former Attorney General John Ashcroft in response to 9/11.
- By Ginger Hill
- Aug 11, 2014
Acquire data to recognize where the issues are and then create a system to train employees to avoid risk.
- By Danny Garrido
- Aug 11, 2014
Accelerates Anixter’s strategic security growth initiative, significantly advancing their existing capabilities and footprint.
- By Matt Holden
- Aug 11, 2014
Safety includes safety practices and methods and people being aware of their surroundings.
- By Ginger Hill
- Aug 08, 2014
Two researchers planned to reveal their findings at Black Hat USA.
- By Matt Holden
- Aug 08, 2014
Cameras display color images at night in HD without IR LEDs.
Complete and fully-functional Silent Knight Fire Alarm and Emergency Communication System serves critical training role in Delaware Tech Fire Engineering Lab.
Analyzes movement in a scene to provide a graphical representation of the areas where the most activity occurred.
Bosch MIC IP 7000 HD family goes IP, captures relevant details in the harshest environments 24/.
Breakthrough encryption and tokenization technologies deliver a new level of safety in today’s risk-prone, online transactional world.
Airport responded that the stowaway posed no security threat because she passed TSA screening.
- By Ginger Hill
- Aug 07, 2014
The company says it has all the markings of a state-sponsored attack.
- By Matt Holden
- Aug 07, 2014
4 ways to battle this social media giant to beat them at their own game.
- By Ginger Hill
- Aug 06, 2014
Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.
- By Matt Holden
- Aug 06, 2014
Hospitals operate 24/7. As a result, countless numbers of people enter and exit their facilities. In order to provide a safe environment for their patients and employees, they need to know who these people are and why they are there.
- By Greg Goyne
- Aug 06, 2014