Deploying automated decoys can help protect your network and reduce IT costs.
- By Gilad David Maayan
- Aug 12, 2019
More companies are rethinking their active shooter training programs and evaluating the financial risk of shootings at their locations.
- By Haley Samsel
- Aug 09, 2019
Fair organizers in New York, Los Angeles and Wisconsin are responding to safety concerns with assurances that their events are well-protected.
- By Haley Samsel
- Aug 09, 2019
Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.
- By Bud Broomhead
- Aug 08, 2019
MOBOTIX is first manufacturer in Europe to obtain the French “CNPP certified” product certification for its cameras.
The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.
- By Haley Samsel
- Aug 08, 2019
Connecting devices to a 0G network is a simple fix to seemingly insurmountable challenges.
A Homeland Security agency and the FBI’s El Paso office are cautioning Americans to watch out for malicious "charity" emails and phone call scams.
- By Haley Samsel
- Aug 07, 2019
Experts believe Cisco’s payout to a whistleblower could set a precedent for future lawsuits against vendors who sell products with security vulnerabilities.
- By Haley Samsel
- Aug 06, 2019
At the Cyber:Secured Forum in Dallas, two Pelco employees broke down the "culture shift" from physical to cyber issues in the security industry.
- By Ralph C. Jensen
- Aug 06, 2019
Communities are calling for legislative action, particularly after it was revealed that one shooting was motivated by white supremacist ideology.
- By Haley Samsel
- Aug 06, 2019
In his new role, Appleby will oversee all of ADI North America’s business operations across the United States, Canada and Puerto Rico
Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.
- By Gilad David Maayan
- Aug 06, 2019
Dr. Ian Bremmer, Expert on Global Geopolitics and Political Risk, to Open Conference
Why corporations owe it to you and society as a whole to stop data breaches and fraud
- By Simon Marchand
- Aug 05, 2019
Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network
- By Yotam Gutman
- Aug 05, 2019
How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests
- By Evan Francen
- Aug 02, 2019
Public safety is a key concern for the music festival, which draws hundreds of thousands to Chicago’s Grant Park each year.
- By Haley Samsel
- Aug 02, 2019
One topic seemed to dominate this year’s conference: the ongoing challenges of integrating physical security technologies with cybersecurity products.
- By Haley Samsel
- Aug 01, 2019
The partnership between the airline and the security company will also offer discounted and free CLEAR memberships to United rewards members.
- By Haley Samsel
- Aug 01, 2019
Mohegan Sun is a premier gaming and resort destination covering 185 acres of reservation land along the banks of the Thames River in the foothills of southeastern Connecticut. First opened on Oct. 12, 1996, Mohegan Sun can truly be classified as a mega- resort.
- By Ralph C. Jensen
- Aug 01, 2019
In the world of sports, oftentimes there’s as much action in the stands as there is on the floor. That’s why the Milwaukee Bucks felt it was so important to design their new stadium with a network of security cameras to safeguard the welfare of players and fans alike.
- By Mark McCormack
- Aug 01, 2019
Biometrics have rapidly expanded into our daily lives, as millions of people use fingerprints to unlock their mobile phones, access cash through ATMs, and verify their identity in a growing range of use cases.
- By Steve Carney
- Aug 01, 2019
Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.
- By Christina Luttrell
- Aug 01, 2019
Criminals often view houses of worship as soft targets. The mission of these groups needn’t change but for the safety of clergy and congregants, leaders must commit to hardening their facilities against those that would do them harm.
- By Dana Pruiett
- Aug 01, 2019
While video surveillance often takes center stage in security deployments, equally as important is audio.
- By Richard Brent
- Aug 01, 2019
Event venues and sporting complexes pose unique security and communication challenges. Numerous factors, including crowd size, whether the event is indoors or outdoors and what time of day the event is taking place all impact how a safety plan is developed.
- By Paul Shain
- Aug 01, 2019
A special word of caution needs to be emphasized when changing over to mobile systems. Many legacy access control systems require the use of backend portal accounts.
- By Scott Lindley
- Aug 01, 2019
For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.
- By Mike Sprunger
- Aug 01, 2019
By their very nature, terrorist attacks and errant drivers, who can also create untold damage, are unpredictable and predicated on surprise.