Emerging Technologies


Hackers could be Targeting Your Smart TV

Hackers Could Be Targeting Your Smart TV

Avast researchers have found a number of vulnerabilities in Smart TVs.

This Key Industry is Way Behind on Data Security

This Key Industry is Way Behind on Data Security

Despite the growing cyber attacks, the health care industry continues to shortchange Americans when it comes to data security.

Military Creates New “Iron Man” Suit

Military Creates New “Iron Man” Suit

The U.S. military is closer than ever to putting Iron Man on the front lines.

Two-Thirds of Security Professionals Expect at Least One Acquisition Next Year

A Capital One survey found that eighty-five percent also expect improved financial performance.

Metro Sales Group to Represent Sielox Solutions

Sielox Solutions partners with Metro Sales Group to serve as manufacturers' representative in the northeast.

Pentagon Suspends Missile Defense Program after Blimp Escapes

Pentagon Suspends Missile Defense Program After Blimp Escapes

The military has indefinitely suspended the JLENS program one week after one of the blimps broke free, spreading chaos with it as it went.

Research Finds 11 High-Impact Security Flaws on Galaxy S6 Edge

Research Finds 11 High-Impact Security Flaws on Galaxy S6 Edge

Google research team finds 11 security flaws on Android device.

5 Products that Define the Next Generation of Home Security

5 Products that Define the Next Generation of Home Security

These technologies are changing the game when it comes to keeping you safe and giving you peace of mind.



Keeping Your Customers Secure - Technology offers a variety of peace of mind benefits

Keeping Your Customers Secure

As interest in connected home technology rises, consumers are beginning to pay attention to its many safety and security benefits.

The Quest for Smarter Power - Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

The Quest for Smarter Power

Security Products magazine sat down with Larry Ye, president and CEO of LifeSafety Power Inc., to discuss how rapid transformation is occurring in the technology—and how RMR is now possible, providing value to both systems integrators and their end-user customers.

Will-Burt Company Security System Earns Top Honors

Company's security system placed on GSA Approved Products List 2.

Three Security Questions to ask Cloud Vendors

Three Security Questions to ask Cloud Vendors

There are many concerns when transferring to the cloud and security is one of the biggest, followed closely by concerns about complying with regulations and losing control of data according to a recent study by 451 Research.

KJB Security Products named North American distributor for LawMate International

A full range of products for law enforcement, military and government now available to KJB's network of government agencies and retailers.

ASSA ABLOY Releases Seven Environmental Product Declarations

An important aspect of an EPD is to provide the basis of a fair comparison of products by their environmental performance.

Tyco Security Products Returns to Security Canada Central

Tyco Security Products Returns to Security Canada Central

The company is bringing its full-suite of integrations as well as security systems and solutions.

ASIS Supports Chula Vista Body Camera Program

ASIS Supports Chula Vista Body Camera Program

Local security professionals are in support of the Chula Vista Police Department’s program.

Global Mobile Networks are Vulnerable to Security Bugs

Global Mobile Networks are Vulnerable to Security Bugs

A new study shows how mobile networks around the world have been hacked via bugs in the code.

The True Cost Of 4K

High definition (HD) and megapixel camera technology continues to evolve, and now 4K is emerging as the latest advancement to video surveillance imaging for security applications.

iPhone Encryption App Data a Major Flaw in Travel Apps

iPhone Encryption Data a Major Flaw in Travel Apps

A new report from Bluebox Security says the top 10 travel apps in the iOS and Android app stores are all riddled with security flaws. Bluebox says encryption app data, insufficient protection against man-in-the-middle attacks, and leftover administration or debugging code are the biggest issues for the iPhone and Android devices.

How Overheated Rhetoric Creates "Privacy Panic Cycle" for New Technologies

Outlines the stages of public panic and factors and trends influencing these stages.

Featured

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3