The shooting in Jersey City lasted for over an hour and ended with a firefight between the suspects and several police officers.
- By Haley Samsel
- Dec 10, 2019
The lawsuit argues that Mercy Hospital and SDI Security did not follow their own protocols by failing to issue alerts or initiating a lockdown of the building.
- By Haley Samsel
- Dec 10, 2019
After the FCC voted to ban telecommunications companies from using subsidies to buy equipment from Huawei, the Chinese company filed suit.
- By Haley Samsel
- Dec 10, 2019
With the January 2020 deadline for CCPA compliance looming, what lessons from GDPR compliance apply most this time around? Topping the list should be thinking and acting beyond compliance to build and sustain a long-range view of data security.
- By Mark Casetta
- Dec 09, 2019
Friends of the gunman, who was in the Saudi air force, have been cooperating with the investigation into the attack, which killed three sailors.
- By Haley Samsel
- Dec 09, 2019
Commercial 5G mobile networks are only just becoming available, with highly developed use cases for improving autonomous automobiles navigation and smart-sensor networks, and new vulnerabilities and security requirements are already emerging.
- By Karen Epper Hoffman
- Dec 09, 2019
We all heard it growing up, “Close and lock the doors when you leave the house!” We all knew where the doors were and how to lock them. It was easy. But what if you don’t know where all the “doors are” and they don’t all have “locks?” What’s the move then?
China is home to more than 54 percent of those cameras, and the most growth is expected in developing countries like India and Brazil.
- By Haley Samsel
- Dec 09, 2019
There are three types of organizations: Those who have been hacked; those who are doing everything in their power to not be hacked; and those who are being hacked right now, without even knowing it.
Today’s security networks have evolved from where they were 20 years ago. With these changes, we have seen many amazing advances in the technology and the connectivity between the systems which comprise today’s complex security systems. Through these advancements has also come concerns on how we secure these systems and the data within them.
- By Chris Garner
- Dec 09, 2019
The decision to reverse plans to expand facial recognition at ports of entry came after widespread criticism from legislators and activists.
- By Haley Samsel
- Dec 06, 2019
This is the second time in three days that a shooter has opened fire at a U.S. naval base.
- By Haley Samsel
- Dec 06, 2019
Two House members want the Department of Homeland Security to increase its rate of inspection from 15 percent of commercial vehicles to 100 percent.
- By Haley Samsel
- Dec 06, 2019
U.K.-based company will begin offering the product in January 2020.
The first-place winner will be honored with their parent at the ESA Expo in June.
The Trump administration plans to expand facial scans from a pilot program for foreign travelers to include all travelers, including permanent residents and citizens.
- By Haley Samsel
- Dec 05, 2019
Many security solutions providers are redesigning and upgrading systems every day. It’s time for them to be rewarded with the R&D Tax Credit.
- By Tracy Lustyan
- Dec 05, 2019
The viral app concerned senators due to the amount of data that it collected, including facial scans of users.
- By Haley Samsel
- Dec 04, 2019
The gunman, a current U.S. sailor, shot the three civilian workers before turning the gun on himself.
- By Haley Samsel
- Dec 04, 2019
The influx of temporary workers can often threaten data security for retailers. But it doesn't have to.
- By Mike Betsko
- Dec 04, 2019
The government claims that the new requirement will prevent fraud for citizens, but critics see it as the furthering of invasive surveillance measures.
- By Haley Samsel
- Dec 03, 2019
Officials have seen an increase of counterfeit goods being sold directly to customers as well as a rise in the use of the dark web.
- By Haley Samsel
- Dec 03, 2019
Security head and CEO showcase facial recognition and other products at event in Arizona
Today’s professional security industry seems to have adopted the “more power” mantra by taking a much more pragmatic approach.
- By Ronnie Pennington
- Dec 01, 2019
The way people and businesses communicate is ever evolving, and with that, so are the communication products.
- By Sherelle Black
- Dec 01, 2019
In keeping with SwedishAmerican’s mission to deliver excellence in healthcare, they also maintain the highest level of care when it comes to keeping their patients, medical staff, and facilities safe.
- By Ralph C. Jensen
- Dec 01, 2019
Not only does modern software architecture create a broader attack surface area, the accelerated DevOps methodology makes it harder to detect and remediate vulnerabilities.
- By Felicia Haggarty
- Dec 01, 2019
Driven by the 2013 physical assault on a California substation, the NERC CIP 14 regulation has reshaped the way energy’s physical security directors are viewing perimeter security.
- By Craig Summers
- Dec 01, 2019