The Security Industry Association selected Steve Van Till as the 2019 recipient of the George R. Lippert Memorial Award.
Even if an organization decides to pay a ransom against the FBI’s advice, they should report the crime to law enforcement, according to the FBI alert.
- By Haley Samsel
- Oct 07, 2019
In the latest ransomware attack scourge, three hospitals in Alabama were able to continue serving existing patients but said they could not take new cases.
- By Haley Samsel
- Oct 04, 2019
The French government plans to introduce a program called Alicem that will require residents to take a selfie video to compare to their passport photo.
- By Haley Samsel
- Oct 04, 2019
Moviegoers and the families of victims of the Aurora theater shooting worry that someone could stage a copycat attack during opening weekend.
- By Haley Samsel
- Oct 03, 2019
Security researchers found 11 significant vulnerabilities in devices that use the IPnet software, though there are no confirmed incidents involving takeovers of the devices.
- By Haley Samsel
- Oct 03, 2019
A majority of Americans did not know about the changing ID requirements for boarding planes in a recent survey, and DHS said that only 27 percent of residents have been issued a Real ID.
- By Haley Samsel
- Oct 02, 2019
The Department of Homeland Security is refocusing its efforts on cyber threats to aircraft, and the Air Force is sponsoring “hacking villages” to discover hacking vulnerabilities.
- By Haley Samsel
- Oct 02, 2019
Price will continue to manage all internal and external corporate communications.
The vast majority of discussions involving security and parking areas focus on protecting people and property from vandalism, theft or violent crimes.
As city streets and sidewalks become progressively more congested, city planners are facing new safety challenges, including distracted pedestrians, a growing numbers of bicyclists on the road and an increase in public transportation.
- By Joel White
- Oct 01, 2019
Recent hacks into databases of some of the world’s biggest corporations and government organizations put the personal information of billions of people at risk.
- By Mohammed Murad
- Oct 01, 2019
The company now offers 11 SAFETY Act Certified products including the Impasse II high security fence and Stalwart anti-ram passive cable barrier systems that received certification in 2015.
Video analytics have been around almost as long as CCTV itself, rescuing security operators from the nearly impossible task of continuously and effectively monitoring video surveillance feeds.
- By Jennifer Hackenburg
- Oct 01, 2019
OSDP, or Open Supervised Device Protocol, is an access control communications standard designed to improve interoperability among access control and security products, and it’s becoming the new standard for access control technology.
- By Kaitlyn DeHaven
- Oct 01, 2019
Cloud storage is most used by small-and-medium businesses (SMBs). The reason is that it comes with many benefits for organizations in terms of flexibility and more importantly productivity.
- By François Amigorena
- Oct 01, 2019
Wyoming State Superintendent Jillian Balow is making an effort to better understand how the state’s 48 school districts’ are protecting their students.
- By Ralph C. Jensen
- Oct 01, 2019
Valdosta Regional Airport in Valdosta, Georgia offers three daily commercial flights to and from Atlanta Hartsfield-Jackson International Airport, along with general aviation.
- By Kim Rahfaldt
- Oct 01, 2019
In today’s IP-centric world, media converters work on lots of different types of media. The three that this article discusses are fiber optic media converters, extended distance media converters, and wireless media converters, all of which are transmitting an Ethernet signal
- By Frank (Skip) Haight
- Oct 01, 2019
A coalition sent a letter to Congress asking members to consider alternatives to banning facial recognition, including the development of best practices and additional training.
- By Haley Samsel
- Oct 01, 2019
Delta Scientific announced that traffic access control professionals can now set up MP5000 portable barriers on concrete, asphalt, compacted soils or vegetation in 15 minutes or less to provide certified M50 stopping power.
Oddly enough, in a world where virtually any item is only a mouse click and 24-hour delivery window away, we tend not to think much about how our merchandise gets from some warehouse to our front door. Unfortunately, there are thieves who do.
- By John Chigos
- Oct 01, 2019
Two of the biggest trends today, particularly in the security surveillance and IoT realms, are border security and the emergence of local governments transforming their communities into smart cities.
- By Kevin Taylor
- Oct 01, 2019
Privacy issues continue to dominate headlines as the world’s biggest companies are being challenged on the ways they collect and use people’s data. Consumers are growing more concerned about how their activities are being tracked across the web as companies sell information to advertisers for a profit.
- By Neil Huntingdon
- Oct 01, 2019
While the political discussions that focus on how to secure America’s borders rage on without a clear resolution regarding what or how policies and procedures could change, one element of the discussion remains clear and present–that technology must and will play an ever more significant role at the U.S. border.
The San Francisco Board of Supervisors’ vote to ban the use of facial recognition technology puts the city at risk of not only falling behind on technological innovation, but returning to what one expert described as archaic processes.
- By Stephanie Kanowitz
- Oct 01, 2019
In today’s world, there are a myriad of different manufacturers that produce similar products and there are so many options available to customers.
- By Michael Stoll
- Oct 01, 2019
Contractors will face big changes and tight timelines next year when the Defense Department institutes its new Cyber Maturity Model Certification framework
- By Derek B. Johnson
- Oct 01, 2019
Under GDPR, companies can be fined for not having their records in order, not notifying the supervising authority and those affected by a breach, or not conducting an impact assessment.
- By Richard Kanadjian
- Oct 01, 2019