Unique, event-based video discover platform coming to ISC West 2014.
Is this a violation of our Second Amendment right or is this responsible gun selling/ownership at it's best?
- By Ginger Hill
- Mar 06, 2014
Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)
- By Atchison Frazer
- Mar 05, 2014
We live in a world full of information as data is being collected each day because the demand is higher than ever before. Consumers want faster access to online data to make quicker, more informed decisions regarding everything from nearby restaurants to the highest-rated tablets.
- By Mike Scirica
- Mar 01, 2014
Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.
- By Ginger Hill
- Feb 24, 2014
The five golden rules of developing a strong network security strategy for managing vendor access.
- By Jeff Swearingen
- Feb 04, 2014
There are tens of thousands of bank branches and financial services locations throughout the world. The business environment itself is complex, as it combines elements of high-end commercial services with a frontline, retail component.
- By Joe Pellettiere
- Feb 01, 2014
For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.
- By Jeremy Earles
- Feb 01, 2014
Looks like it is just about time for biometrics to make its long awaited debut. Yes, we have seen biometrics for quite some time, and it is true that the impact has been strong in the security world. But, get ready to see biometrics on steroids. It’s coming.
- By Ralph C. Jensen
- Feb 01, 2014
Things you need to do NOW if you have recently shopped at this arts and crafts store.
- By Ginger Hill
- Jan 27, 2014
As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.
- By Ginger Hill
- Jan 10, 2014
Commercial Virtual Private Networks (VPNs) are playing an increasing role in the current battle between privacy-conscious web users and government agencies seeking to increase their surveillance reach. But as online privacy becomes yet another product, ready to be branded and packaged, the problem of dishonest vendors, and a lack of education amongst customers, threatens to undermine any real benefit the market can bring.
- By Nick Pearson
- Dec 17, 2013
Over the next 12 days, check back for updated safety and security tips, clever lyrics and holiday fun with Security Today as we explore the 12 Days of Christmas...security style!
- By Ginger Hill
- Dec 12, 2013
What you can do to help prevent your social media login credentials from getting stolen.
- By Ginger Hill
- Dec 04, 2013
Integrated system offers improved response and management control.
Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.
- By Charles P. Williams
- Dec 01, 2013
To plug in or not to plug in? This is the question. Innovative Technology’s CEO, Corey Lieblein examines portable power solutions vs. the public charging kiosk.
- By Corey Lieblein
- Nov 04, 2013
The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount.
- By Mark Steffler
- Nov 01, 2013
A world saturated with digital data needs assurance that this data won't fall into the wrong hands.
- By Ginger Hill
- Oct 17, 2013
Deep storage appliance delivers the most scalable and cost-effective, long-term storage.