The live webpage will frequently update with content from the show floor.
- By Matt Holden
- Mar 23, 2017
Users of AT&T’s wireless network found themselves without the ability to call 911 last night.
Mass-market drones have exploded in popularity over the last few years, with smaller price tags allowing thousands of hobbyists to purchase their own. From casual flyers to news organizations, the rising number of drones (UAVs) flying overhead brings serious security concerns with it.
- By Logan Harris
- Feb 16, 2017
Local, federal, state and private security officials are teaming up to create a security stronghold that protects a three mile area around the stadium.
If these technologies aren’t on your radar, they probably should be. These product categories are rapidly growing in popularity and for good reason.
- By Brian Carle
- Dec 01, 2016
What’s ahead in 2017? In 2016, we saw video surveillance and security increasingly become the focus of mainstream media conversations, with video playing a pivotal role in bringing terror suspects to justice (as it did recently in NYC) and with police body-worn cameras capturing sometimes controversial incidents that spark national conversations.
- By Wayne Arvidson
- Dec 01, 2016
This year marks the 20th anniversary of the world’s first IP network camera, a technology that eventually revolutionized the video surveillance landscape.
- By Fredrik Nilsson
- Dec 01, 2016
It’s an exciting time to be in the security industry, as evidenced by the successful year we have seen in regards to technology innovations, mergers and acquisitions, and a renewed sense of pride in the industry.
- By Sharad Shekhar
- Dec 01, 2016
Network design is challenging, requiring designers to balance user performance expectations with network-resource costs, capacities, capabilities, and use scenarios.
- By Steve Surfaro
- Sep 06, 2016
Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.
- By Sydny Shepard
- Jun 23, 2016
While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.
- By Eric Aarrestad
- Jun 20, 2016
Father’s Day is just around the corner; give Dad the gift of security with one of these products.
- By Sydny Shepard
- Jun 17, 2016
A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm.
- By Sydny Shepard
- Jun 08, 2016
A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.
- By Sydny Shepard
- Jun 07, 2016
By definition, PIAM is an end-to-end solution that manages identities, compliance and events across disparate physical security systems.
- By Don Campbell
- Jun 03, 2016
After revolving doors emerged on the architectural scene in the late 19th century, they were very much in vogue and favored as a way to provide building access stylishly.
- By Arnie Kravitz
- Jun 01, 2016
As technology in every industry grows by leaps and bounds, there will always be something new to talk about. However, the Internet of Things seems to cross all boundaries, and within an industry IoT becomes the building automation tool to make it all work.
- By Ralph C. Jensen
- Jun 01, 2016
Researchers in China have released details on the first robotic security guard aimed to stop riots.
- By Sydny Shepard
- Apr 29, 2016
A TV station in Baltimore is grateful for added security measures after bizarre standoff with costumed man.
- By Sydny Shepard
- Apr 29, 2016
The FBI was finally able to extract the data from the San Bernardino attacker’s iPhone, but was it worth the price?
- By Sydny Shepard
- Apr 22, 2016