May 15-18 Verint’s “Road to Certification” roadshows are designed for system integrators who manage, utilize or support the Nextiva VMS platform.
RSA Conference, the world’s leading information security conferences and expositions, recently announced the honorees of its 15th annual awards program.
Though the thief stole thousands of dollars worth of jewelry, the Calderons were just thankful to be alive.
- By Sherleen Mahoney
- Mar 01, 2012
Organizations whose operations span cities, countries and even continents face formidable challenges in their efforts to secure people, property and assets.
- By Debjit Das
- Mar 01, 2012
Come and listen to the story of an Austrian named Glock, He and wife, Helga, made curtain rods in their shop, Then one day he invented a new handgun, And the Austrian army said, “We gotz to have us one.” Glock, that is. Lightweight. Model 17. Well, the first thing you know ol’ Glock’s a billionaire, Kinfolk said, “Gast’, export it away from there!” Said, “USA is the place it oughta be.” So he marketed it abroad to frontline security. The police, that is—needing new fire power.
- By Ronnie Rittenberry
- Mar 01, 2012
Advances in communication technology, trade barriers and production cost reductions have furthered global capital markets and provided new economic opportunities.
- By Ralph C. Jensen
- Mar 01, 2012
Veracode Inc. recently announced the availability of a whitepaper, ‘Outsourcing the problem of software security’, produced by primary research and analysis company, Quocirca.
Many people—even within the security industry—may be surprised to learn how traditional alarm dispatches work. It can be a lengthy process.
- By Megan Weadock
- Mar 01, 2012
Thales, provider of information systems and communications security, recently announced the publication of the 2011 Global Encryption Trends Study.
In order to allow an all-IP-based services platform, service providers are upgrading existing networks and migration strategies.
- By Terence Martin Breslin
- Mar 01, 2012
The Cloud Security Alliance (CSA) recently announced two significant new initiatives for 2012, addressing growing areas of need in cloud security -- mobile computing and innovation.
HID Global recently announced its highly-integrated fraud detection service from its Identity Assurance business, ActivIdentity.
Mission-critical facilities such as data and telecommunications centers must maintain operations without interruption.
- By Kris Cahill
- Mar 01, 2012
The Port of Portland services more than 800 vessel calls each year, accounting for more than 14 million tons of ocean-going cargo.
Among Austin Independent School District’s top-stated values are excellence and the health and safety of its students, and it shows.
- By Judy Jones
- Mar 01, 2012
Mission 500, a charitable organization engaging security professionals to sponsor needy children through the World Vision organization, recently announced the winners of its annual Humanitarian and Corporate Social Responsibility (CSR) awards. The awards are designed to honor companies in the security industry who make important contributions to those in need.
Security takes on a new perspective when looking at the IT side of the aisle. After my first day through the RSA Conference in San Francisco, I have to say Cherry’s FIPS 201 compliant keyboard makes simple look pretty smart.
- By Ralph C. Jensen
- Feb 29, 2012
In the wake of the recent active-shooter tragedy in Ohio, ASIS International (ASIS), the largest organization for security management professionals worldwide, is delivering a 60-minute webinar entitled “Reducing Risk of Violence in Schools” on Friday, March 2, 2012 at 12:00 p.m. Nationally acclaimed school security expert Paul Timm, PSP will be the featured speaker.
For the older population, the security and comfort provided by retirement living communities makes them an attractive option. At St. Andrews Village in Auckland, New Zealand, the comfort is provided in a world-class multi-option residential facility and the security is provided by Arecont Vision megapixel camera technology.
California’s three-strikes law has not reduced violent crime, but has contributed significantly to the state’s financial woes by substantially increasing the prison population, according to a University of California, Riverside researcher.
StopBadware and Commtouch recently published a joint report titled "Compromised Websites: An Owner's Perspective" that chronicles webmasters' experiences with hacked websites. The report presents statistics and opinions on how site owners navigate the process of learning their sites have been hacked and repairing the damage.
A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.
Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.
Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.
The partnership will allow customers to easily develop real-time MIL-STD-1553 and ARINC applications for Windows platforms.
Security industry members anxious to attend the 2012 Electronic Security Expo (ESX) event in Nashville, Tenn., now have the opportunity to lock-in early bird rates. Members of the industry can register here for the event, being held June 25-29.
The Shawnee County Department of Corrections (SNDOC) in Topeka, Kan., deployed a new high-definition surveillance system to heighten security, expedite investigations, and ultimately, improve inmate behavior.
With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.