 
                    
                                        
		            
                    Integrated with the smartphone's firmware, it is impossible to remove or disable the malicious app.
                    
			            - By Ginger  Hill
- Jun 18, 2014
 
            
                
	                
                    
                                        
		            
                    Complementary solution delivers industry's top-rated systems.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    A quick tour through this event shows that there is something for everyone. 
                    
			            - By Ginger  Hill
- Jun 17, 2014
 
            
                
	                 
                    
                                        
		            
                    Crime doesn't discriminate against size; small businesses are typically most vulnerable with fewer resources to guard against it. 
                    
			            - By Scott  McNulty
- Jun 17, 2014
 
            
                
	                
                    
                                        
		            
                    Key control and management solutions offer state-of-the-art security.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New Orleans branch moving into 10,000 square foot facility.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Skyteboard 3G, an iOS and Android app-controlled drone, could help facilitate interaction in local communities. (Video Included)
                    
			            - By Ginger  Hill
- Jun 16, 2014
 
            
                
	                 
                    
                                        
		            
                    As unregulated virtual currencies make their way back into iOS devices, what type of security issues will develop? 
                    
			            - By Ginger  Hill
- Jun 16, 2014
 
            
    
                
	                
                    
                                        
		            
                    GovSec – the Government Security Conference and Expo, which featured TREXPO, the Law Enforcement Expo, and was held in conjunction with CPM East – saw its conference grow by 20 percent and total attendance reach more than 3,600 in 2014.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Goal is to bring combined strengths of both companies to the development and delivery of the brand.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    KeyWatcher Systems ensure accountability for keys and essential communication devices.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New combination will create formidable player in market by combining the strengths of Canon’s imaging technology with Milestone’s video management software.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.
                    
			            - By Ginger  Hill
- Jun 12, 2014
 
            
                
	                 
                    
                                        
		            
                    4 elements that must be included in a security strategy to gather information from a variety of sources to create heightened security within an organization.
                    
			            - By Brian   McIlravey
- Jun 11, 2014
 
            
                
	                 
                    
                                        
		            
                    How three security professionals in the education vertical are keeping their campuses safe and secure for all.
                    
			            - By Ginger  Hill
- Jun 11, 2014
 
            
                
	                 
                    
                                        
		            
                    Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
                    
			            - By Ginger  Hill
- Jun 11, 2014
 
            
                
	                 
                    
                                        
		            
                    ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.
                    
			            - By Kim  Humborstad
- Jun 10, 2014
 
            
                
	                 
                    
                                        
		            
                    Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?
                    
			            - By Ginger  Hill
- Jun 10, 2014
 
            
                
	                 
                    
                                        
		            
                    GSM radio sewn into sweatshirt allows different gestures to trigger different text messages to be sent to smartphone contact. 
                    
			            - By Ginger  Hill
- Jun 09, 2014
 
            
                
	                
                    
                                        
		            
                    Designed for company's DVRs and Hybrid DVR standalone recorders to allow more control of surveillance system in palm of users hand.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    Parents of school children are standing up against Big Data when it comes to their children's personal information.
                    
			            - By Ginger  Hill
- Jun 09, 2014
 
            
                
	                
                    
                                        
		            
                    DRS Technologies Inc., a Finmeccanica Company, announced recently that its WatchMaster thermal camera specifications will be available to building designers using Autodesk Seek, a leading Building Information Modeling (BIM) web application accessible to Autodesk Revit users. 
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    A second grader at Tournament Hills Elementary in Beaumont, California demonstrates what it means to go from bully to friend. (Awesome video included; a true must-see!)
                    
			            - By Ginger  Hill
- Jun 06, 2014
 
            
                
	                 
                    
                                        
		            
                    Just a week before the end of the school year, a lone gunman riddles students with fear on Seattle Pacific University's campus. 
                    
			            - By Ralph  C. Jensen
- Jun 06, 2014
 
            
                
	                 
                    
                                        
		            
                    Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.
                    
			            - By Ginger  Hill
- Jun 05, 2014
 
            
                
	                 
                    
                                        
		            
                    China's People's Daily, a state-operated media outlet, promises punishments as translated by Reuters.
                    
			            - By Ginger  Hill
- Jun 04, 2014
 
            
                
	                 
                    
                                        
		            
                    Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.
                    
			            - By Ginger  Hill
- Jun 04, 2014
 
            
                
	                 
                    
                                        
		            
                    In a world where security measures are always changing, but to date, have failed to keep our identities safe, what is the best way to keep our personal material truly secure?
                    
			            - By Hector  Hoyos
- Jun 03, 2014
 
            
                
	                
                    
                                        
		            
                    Series of high definition cameras and CVR digital video recorders that use the same coaxial cable, connectors and power plugs as a traditional analog CCTV system.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Partnership within the security industry furthers the development of IP-based interoperability standards.