Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.
- By Christina Luttrell
- Aug 01, 2019
Criminals often view houses of worship as soft targets. The mission of these groups needn’t change but for the safety of clergy and congregants, leaders must commit to hardening their facilities against those that would do them harm.
- By Dana Pruiett
- Aug 01, 2019
While video surveillance often takes center stage in security deployments, equally as important is audio.
- By Richard Brent
- Aug 01, 2019
Event venues and sporting complexes pose unique security and communication challenges. Numerous factors, including crowd size, whether the event is indoors or outdoors and what time of day the event is taking place all impact how a safety plan is developed.
- By Paul Shain
- Aug 01, 2019
A special word of caution needs to be emphasized when changing over to mobile systems. Many legacy access control systems require the use of backend portal accounts.
- By Scott Lindley
- Aug 01, 2019
For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.
- By Mike Sprunger
- Aug 01, 2019
By their very nature, terrorist attacks and errant drivers, who can also create untold damage, are unpredictable and predicated on surprise.
Being a TSA agent at Phoenix Sky Harbor International Airport doesn’t mean you have to understand the game of football or does it?
- By Ralph C. Jensen
- Aug 01, 2019
The shipping industry is being tasked to improve productivity, increase speed of operations and mitigate risk from new and potentially devastating forms of attack from both external and internal potential threats.
- By Aluisio Figueiredo
- Aug 01, 2019
The Minnesota locksmith wholesale company is the latest to join the ABLOY USA distributor network.
Dominion Nickel Alloys Ltd. operates on a global scale. Dominion specializes in the purchasing, sorting, processing, and marketing of a broad range of high temperature and specialty nickel-based alloys.
- By Suzi Abell
- Aug 01, 2019
Cybersecurity and physical security no longer exist in two different worlds. Each now supports and depends on the other as part of a comprehensive risk and liability management program.
- By Greg Schreiber
- Aug 01, 2019
The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.
- By Richard Kanadjian
- Aug 01, 2019
As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a heavy reliance on the network.
- By Moses Anderson
- Aug 01, 2019
A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.
- By Haley Samsel
- Jul 31, 2019
Planes using networked communication systems are particularly vulnerable to cyberattacks, according to a flaw discovered by researchers.
- By Haley Samsel
- Jul 31, 2019
An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.
- By Haley Samsel
- Jul 30, 2019
The Gilroy, California police chief credited his department’s robust security operation with stopping the shooter in his tracks.
- By Haley Samsel
- Jul 30, 2019
The report comes as Senate Republicans move to block election security legislation, arguing that election officials have already fixed the security issues they experienced in 2016.
- By Haley Samsel
- Jul 29, 2019
Skateboarders are re-examining a culture of conflict with security guards in the wake of a tragic incident between a professional skater and a guard in San Francisco.
- By Haley Samsel
- Jul 29, 2019
Eliminate trust based on location, such as within a company network, and always verify users at every access request.
- By Yotam Gutman
- Jul 26, 2019
The legislation, which would ban facial recognition entry systems, would be the first to address what technology landlords can impose on residents.
- By Haley Samsel
- Jul 26, 2019
California law enforcement is praising the use of drones and high-definition video surveillance to track suspects and strategize police responses.
- By Haley Samsel
- Jul 25, 2019
Americans could be signing over the keys to their identity when filling out medical forms that promise to “anonymize” their information, according to a new algorithm developed by scientists.
- By Haley Samsel
- Jul 25, 2019
Security experts and lawmakers say that creating a “backdoor” to unlock devices and messages would make those products vulnerable to hackers.
- By Haley Samsel
- Jul 24, 2019
Major update offers security teams higher video stream density as well as reduced cost per desktop and video stream resulting in lower TCO and improved situational awareness.
The city was never able to get the software, Rekognition, to consistently work with its video surveillance cameras over the course of 15 months.
- By Haley Samsel
- Jul 24, 2019
Following a rise in expressway violence, law enforcement will add about 35 cameras to look into shootings that are notoriously difficult to solve.
- By Haley Samsel
- Jul 23, 2019
The credit-reporting agency will pay at least $300 million to victims. But it may be difficult for consumers to prove direct losses from identity theft.
- By Haley Samsel
- Jul 23, 2019
The camera uses advanced image processing technology for improved depth perception