Key control and asset management technology are reliable and cost-effective methods to improve security by ensuring that facility keys are properly managed with regard to access, storage and tracking.
- By Fernando Pires
- Jun 27, 2014
Seeing what’s out there is the beginning of situational awareness. Over the years, video surveillance technology has steadily raised the level of situational awareness available to security teams, and today’s video technologies are pushing the envelope again.
- By Richard E. Widup Jr.
- Jun 27, 2014
Do you remember that one hotel you’ve stayed at during the course of your travels? You remember the one I’m talking about; it looked good on the outside, but inside, there was no security. It sort of left you feeling weak in the knees hoping nothing bad would happen.
- By Ralph C. Jensen
- Jun 27, 2014
Over 300,000 servers still vulnerable; McAfee offers free detection tool.
- By Ginger Hill
- Jun 24, 2014
Allows quick communication between cybersecurity professionals who respond to cyber threats.
- By Ginger Hill
- Jun 23, 2014
As campus shootings increase across the nation, retailers are stepping up to create bulletproof products.
- By Ginger Hill
- Jun 19, 2014
Total number affected still unknown, but company to offer free credit monitoring.
- By Ginger Hill
- Jun 19, 2014
What it all boils down to is internal vs. external cyber communications.
- By Ginger Hill
- Jun 18, 2014
Integrated with the smartphone's firmware, it is impossible to remove or disable the malicious app.
- By Ginger Hill
- Jun 18, 2014
Complementary solution delivers industry's top-rated systems.
A quick tour through this event shows that there is something for everyone.
- By Ginger Hill
- Jun 17, 2014
Crime doesn't discriminate against size; small businesses are typically most vulnerable with fewer resources to guard against it.
- By Scott McNulty
- Jun 17, 2014
Key control and management solutions offer state-of-the-art security.
New Orleans branch moving into 10,000 square foot facility.
Skyteboard 3G, an iOS and Android app-controlled drone, could help facilitate interaction in local communities. (Video Included)
- By Ginger Hill
- Jun 16, 2014
As unregulated virtual currencies make their way back into iOS devices, what type of security issues will develop?
- By Ginger Hill
- Jun 16, 2014
GovSec – the Government Security Conference and Expo, which featured TREXPO, the Law Enforcement Expo, and was held in conjunction with CPM East – saw its conference grow by 20 percent and total attendance reach more than 3,600 in 2014.
Goal is to bring combined strengths of both companies to the development and delivery of the brand.
KeyWatcher Systems ensure accountability for keys and essential communication devices.
New combination will create formidable player in market by combining the strengths of Canon’s imaging technology with Milestone’s video management software.
Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.
- By Ginger Hill
- Jun 12, 2014
4 elements that must be included in a security strategy to gather information from a variety of sources to create heightened security within an organization.
- By Brian McIlravey
- Jun 11, 2014
How three security professionals in the education vertical are keeping their campuses safe and secure for all.
- By Ginger Hill
- Jun 11, 2014
Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
- By Ginger Hill
- Jun 11, 2014
ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.
- By Kim Humborstad
- Jun 10, 2014
Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?
- By Ginger Hill
- Jun 10, 2014
GSM radio sewn into sweatshirt allows different gestures to trigger different text messages to be sent to smartphone contact.
- By Ginger Hill
- Jun 09, 2014
Designed for company's DVRs and Hybrid DVR standalone recorders to allow more control of surveillance system in palm of users hand.
Parents of school children are standing up against Big Data when it comes to their children's personal information.
- By Ginger Hill
- Jun 09, 2014
DRS Technologies Inc., a Finmeccanica Company, announced recently that its WatchMaster thermal camera specifications will be available to building designers using Autodesk Seek, a leading Building Information Modeling (BIM) web application accessible to Autodesk Revit users.