 
                    
                                        
		            
                    The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.
                    
		            
                
                    
                    
                    
                 
            
    
                
	                 
                    
                                        
		            
                    A strategy for the successful management of vendor remote access.
                    
			            - By Ginger  Hill
- Jan 30, 2014
 
            
                
	                 
                    
                                        
		            
                    What to do if your statement has a charge of $9.84 followed by an unfamiliar website URL.
                    
			            - By Ginger  Hill
- Jan 28, 2014
 
            
                
	                 
                    
                                        
		            
                    Things you need to do NOW if you have recently shopped at this arts and crafts store.
                    
			            - By Ginger  Hill
- Jan 27, 2014
 
            
                
	                 
                    
                                        
		            
                    Even after closing a tab, pop-up window has the ability to record your voice, almost indefinitely, without you even knowing.
                    
			            - By Ginger  Hill
- Jan 22, 2014
 
            
                
            
                
	                 
                    
                                        
		            
                    Hey Target shoppers! Here's your special of the day to keep your shopping experience at Target out of the hands of the "bad guys."
                    
			            - By Ginger  Hill
- Jan 13, 2014
 
            
                
	                 
                    
                                        
		            
                    As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.
                    
			            - By Ginger  Hill
- Jan 10, 2014
 
            
                
	                
                    
                                        
		            
                    Most-read articles of 2103 are about airport security, iPhones, social media, guns, TSA, Android and Homeland Security.
                    
			            - By Ginger  Hill
- Jan 06, 2014
 
            
                
	                 
                    
                                        
		            
                    For more than 20 years, biometric hand geometry systems have been providing the highest level of security, access control and convenience in a wide range of applications all over the world.
                    
			            - By Emily  Flink
- Dec 31, 2013
 
            
                
	                 
                    
                                        
		            
                    Commercial Virtual Private Networks (VPNs) are playing an increasing role in the current battle between privacy-conscious web users and government agencies seeking to increase their surveillance reach. But as online privacy becomes yet another product, ready to be branded and packaged, the problem of dishonest vendors, and a lack of education amongst customers, threatens to undermine any real benefit the market can bring.
                    
			            - By Nick   Pearson
- Dec 17, 2013
 
            
                
	                 
                    
                                        
		            
                    Over the next 12 days, check back for updated safety and security tips, clever lyrics and holiday fun with Security Today as we explore the 12 Days of Christmas...security style! 
                    
			            - By Ginger  Hill
- Dec 12, 2013
 
            
                
	                 
                    
                                        
		            
                    Helping you and your family stay safe while enjoying your Playstation 4 gaming journey.
                    
			            - By Ginger  Hill
- Dec 11, 2013
 
            
                
	                 
                    
                                        
		            
                    What you can do to help prevent your social media login credentials from getting stolen.
                    
			            - By Ginger  Hill
- Dec 04, 2013
 
            
                
	                 
                    
                                        
		            
                    Cybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks. 
                    
			            - By Márton  Illés
- Dec 01, 2013
 
            
                
	                
                    
                                        
		            
                    Last spring, in late March, regional grocer Schnucks Markets reported that the credit card data of more than 2 million customers was stolen by cybercriminals.
                    
			            - By Jason  Mical
- Dec 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.
                    
			            - By Charles P.  Williams
- Dec 01, 2013
 
            
                
	                 
                    
                                        
		            
                    Kevin Kolbye, as assistant special agent in charge of the FBI’s Dallas office, spoke about the FBI’s counterterrorism efforts.
                    
			            - By Jamie  Friedlander
- Nov 21, 2013
 
            
                
	                 
                    
                                        
		            
                    Solutions that generate crypto keys may be the answer.
                    
			            - By Dave  Anderson
- Nov 14, 2013
 
            
                
	                 
                    
                                        
		            
                    Grab your cup of coffee, and take 5 minutes to make sure you stay safe online!
                    
			            - By Ginger  Hill
- Nov 08, 2013