Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
- By Ginger Hill
- Jun 11, 2014
ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.
- By Kim Humborstad
- Jun 10, 2014
Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?
- By Ginger Hill
- Jun 10, 2014
GSM radio sewn into sweatshirt allows different gestures to trigger different text messages to be sent to smartphone contact.
- By Ginger Hill
- Jun 09, 2014
Designed for company's DVRs and Hybrid DVR standalone recorders to allow more control of surveillance system in palm of users hand.
Parents of school children are standing up against Big Data when it comes to their children's personal information.
- By Ginger Hill
- Jun 09, 2014
DRS Technologies Inc., a Finmeccanica Company, announced recently that its WatchMaster thermal camera specifications will be available to building designers using Autodesk Seek, a leading Building Information Modeling (BIM) web application accessible to Autodesk Revit users.
A second grader at Tournament Hills Elementary in Beaumont, California demonstrates what it means to go from bully to friend. (Awesome video included; a true must-see!)
- By Ginger Hill
- Jun 06, 2014
Just a week before the end of the school year, a lone gunman riddles students with fear on Seattle Pacific University's campus.
- By Ralph C. Jensen
- Jun 06, 2014
Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.
- By Ginger Hill
- Jun 05, 2014
China's People's Daily, a state-operated media outlet, promises punishments as translated by Reuters.
- By Ginger Hill
- Jun 04, 2014
Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.
- By Ginger Hill
- Jun 04, 2014
In a world where security measures are always changing, but to date, have failed to keep our identities safe, what is the best way to keep our personal material truly secure?
- By Hector Hoyos
- Jun 03, 2014
Series of high definition cameras and CVR digital video recorders that use the same coaxial cable, connectors and power plugs as a traditional analog CCTV system.
Partnership within the security industry furthers the development of IP-based interoperability standards.
Former director, business development promoted to vice president, corporate strategy.
Just imagine unlocking your phone, buying apps and giving other apps permission to use your phone's fingerprint scanner for authentication.
- By Ginger Hill
- Jun 02, 2014
City uses modern tools to crack down on bike thievery enabling police officers to make on-the-spot arrests.
- By Ginger Hill
- Jun 02, 2014
Identification, emergency response, security solutions and on-site service provider expands Ohio customer base.
Analysis of Supply Chain – Information Sharing & Analysis Center Annual Report
- By Jack DeMao
- Jun 02, 2014
For the past three decades, video surveillance has proven itself beneficial in helping businesses reduce costs, stop losses and increase productivity. However, these systems either require additional manpower to monitor video feeds live, or are only used to review recorded video, after the fact.
Globally, air cargo security costs are estimated to be $8.5 billion annually as the focus on physical security best practices has increased dramatically since 9/11. In fact, in 2006, the vulnerability of air cargo security was exposed when a terrorist plot was foiled in Yemen.
- By Manish Dalal
- Jun 01, 2014
Located about 20 miles northwest of Newark, Livingston Public Schools serve almost 5,800 students with an instructional staff of 524 in its K-12 system.
- By April Noblitt
- Jun 01, 2014
When the new St. Luke’s Magic Valley Medical Center opened in 2011, it came complete with a top-of-the-line fire detection system that had been the focus of intense planning— and not just from engineers and designers.
- By Beth Welch
- Jun 01, 2014
When a successful European toy manufacturer outgrew its facilities, it built a new, three-facility campus that included an office along with manufacturing and warehouse space.
- By Susan Stanley
- Jun 01, 2014
Many hospitals are finding it necessary to increase the number of access controlled openings in their facilities.
- By Ann Geissler Timme
- Jun 01, 2014
Video analytics aren’t just tools for marketing and merchandising; these intelligent algorithms can also spot atypical customer behavior that might suggest potential loss activity when viewed by the Loss Prevention department.
- By Jackie Andersen
- Jun 01, 2014
It is a well-known fact that video surveillance cameras can help detect trespassers; however, if no one is looking at the surveillance or if the human element has not been notified of a breach, trespassing can leap to new heights.
- By Ralph C. Jensen
- Jun 01, 2014
Operating in the United Kingdom and America for over 30 years, surveillance technology company Dedicated Micros continues to innovate on a regular basis.
- By Jamie Friedlander
- Jun 01, 2014
It all started in Boston—a young, motivated inventor trying to meet the particular customer demand of a new electric strike design that could handle a 1-inch deadbolt.
- By Wendy Bowman
- Jun 01, 2014