With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.
- By Cale Dowell
- Apr 10, 2015
An official has stated that unclassified computers at the White House are vulnerable.
- By Matt Holden
- Apr 08, 2015
Expanded BT200Z smart card reader includes support for Windows 8.1.
Believed to be the largest dataset ever publicly released in the United States.
- By Ginger Hill
- Mar 24, 2015
A flaw was discovered in the Hilton HHonors program that could let anyone hijack all accounts.
- By Matt Holden
- Mar 24, 2015
SuperNova Series delivers on scalability, reliability, and price.
Partnerships combines access control and security management solutions with DME.
New video solutions offer services that stream and store live and recorded video, provide flexible cloud storage and generate notification and real-time analytics.
Causing fraudulent charges to appear on credit cards and users being locked out of accounts.
- By Ginger Hill
- Mar 19, 2015
Security researchers meet to discuss tactics and strategies for exploiting security flaws in iPhones and iPads.
- By Ginger Hill
- Mar 11, 2015
We don’t know much yet, but Apple has shown a few features that will help keep your information safe.
- By Matt Holden
- Mar 11, 2015
MicroTokenization adds protection to data “around the card," adding to the newest requirement set for October 2015 EMV Standards.
The player accidentally swapped laptops with a principal while going through security.
- By Matt Holden
- Mar 09, 2015
A misconfigured encryption system left it vulnerable to hacking.
Cost is in the billions but only addresses a narrow range of security issues.
- By Ginger Hill
- Mar 04, 2015
The flaw leaves Apple and Android users vulnerable.
- By Matt Holden
- Mar 04, 2015
Higher education leaders are asking the state for more money to help protect universities from IT security threats.
- By Matt Holden
- Mar 03, 2015
Criminals are using the platform to buy goods with stolen identities and credit cards
- By Matt Holden
- Mar 03, 2015
Just how safe will the "Internet of Toys" be for your children?
- By Ginger Hill
- Feb 24, 2015
Delivers reliable, fiber-like performance via unlicensed wireless spectrum.