For more than 20 years, biometric hand geometry systems have been providing the highest level of security, access control and convenience in a wide range of applications all over the world.
- By Emily Flink
- Dec 31, 2013
Commercial Virtual Private Networks (VPNs) are playing an increasing role in the current battle between privacy-conscious web users and government agencies seeking to increase their surveillance reach. But as online privacy becomes yet another product, ready to be branded and packaged, the problem of dishonest vendors, and a lack of education amongst customers, threatens to undermine any real benefit the market can bring.
- By Nick Pearson
- Dec 17, 2013
Over the next 12 days, check back for updated safety and security tips, clever lyrics and holiday fun with Security Today as we explore the 12 Days of Christmas...security style!
- By Ginger Hill
- Dec 12, 2013
Helping you and your family stay safe while enjoying your Playstation 4 gaming journey.
- By Ginger Hill
- Dec 11, 2013
What you can do to help prevent your social media login credentials from getting stolen.
- By Ginger Hill
- Dec 04, 2013
Cybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks.
- By Márton Illés
- Dec 01, 2013
Last spring, in late March, regional grocer Schnucks Markets reported that the credit card data of more than 2 million customers was stolen by cybercriminals.
- By Jason Mical
- Dec 01, 2013
Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.
- By Charles P. Williams
- Dec 01, 2013
Kevin Kolbye, as assistant special agent in charge of the FBI’s Dallas office, spoke about the FBI’s counterterrorism efforts.
- By Jamie Friedlander
- Nov 21, 2013
Solutions that generate crypto keys may be the answer.
- By Dave Anderson
- Nov 14, 2013
Grab your cup of coffee, and take 5 minutes to make sure you stay safe online!
- By Ginger Hill
- Nov 08, 2013
The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount.
- By Mark Steffler
- Nov 01, 2013
Grant valued at more than $1.5 million is one of four being awarded this year through the National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative.
A world saturated with digital data needs assurance that this data won't fall into the wrong hands.
- By Ginger Hill
- Oct 17, 2013
Methodical approach and identifying the right tools to meet individual needs is key to security against cyber threats.
- By Vann Abernethy
- Oct 07, 2013
Data from Google scanning can be used for more than just targeting advertising, though what Google might be doing with private information is currently under seal.
- By Antonia Gregory
- Sep 19, 2013
Launching expanded set of managed security solutions, new capabilities and the expanding of their cyber security portfolio.
- By Ginger Hill
- Sep 10, 2013
Should a school's curriculum include teaching students how to hack computers?
- By Ginger Hill
- Sep 04, 2013