Emerging Technologies


St. Jude Medical to Form Cybersecurity Board

St. Jude Medical to Form Cybersecurity Board

Medical-device maker, St. Jude Medical, is forming a cybersecurity board to advice on the cyber standards of equipment.

Live from ASIS 2016 Preview

Live from ASIS 2016 Preview

For the first time at an ASIS show, Security Products Magazine and SecurityToday.com will be covering the industry event live, utilizing social media and a new landing page on our site to keep those at home up to date on the latest product announcements and innovations

Your Best Project: Ten Security Design Tools You Must Try

SPONSORED

Your Best Project: Ten Security Design Tools You Must Try

Network design is challenging, requiring designers to balance user performance expectations with network-resource costs, capacities, capabilities, and use scenarios.

The Boston Globe Taps Mobile App to Help Employees Prepare for Emergencies

The Boston Globe Taps Mobile App to Help Employees Prepare for Emergencies

The Boston Globe is moving to a new building in downtown Boston and with the move comes a new Crisis Communication plan.

It

Industry Professional

It's a BASH

A vehicle with the ability to remotely monitor and record has been rolled out for city wide use. The prototype, created by Dotworkz, was designed for use at construction sites, high profile events and even search and rescue missions.

Body Cam Footage: Pokémon Go Player Collides with Police Car

Body Cam Footage: Pokémon Go Player Collides with Police Car

Baltimore Police Department released video of a car colliding with a parked police car while the driver was playing Pokémon Go.

Texas Universities Rush to Finalize Campus Carry Policies

Texas Universities Rush to Finalize Campus Carry Policies

On August 1, 2016 S.B. 11, otherwise known as the campus carry law, will go into effect.

Detroit Police Arrest Four for Social Media Threats

Detroit Police Arrest Four for Social Media Threats

Four men threatened on Facebook to kill police officers.



Background Checks Rise 40 percent in June

Background Checks Rise 40 percent in June

After the deadliest mass shooting in U.S. history, federal background checks for gun purchases increased in June.

Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

Security Products Dad Will Love

Security Products Dad Will Love

Father’s Day is just around the corner; give Dad the gift of security with one of these products.

Hackers Take Over Outlander PHEV

Hackers Take Over Outlander PHEV

A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm.

Facebook Vulnerability Allows Hacker to Alter Conversations

Facebook Vulnerability Allows Hacker to Alter Conversations

A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.

Solid ROI Metrics Support Case for PIAM

Solid ROI Metrics Support Case for PIAM

By definition, PIAM is an end-to-end solution that manages identities, compliance and events across disparate physical security systems.

INDUSTRY FOCUS

Always Something New

As technology in every industry grows by leaps and bounds, there will always be something new to talk about. However, the Internet of Things seems to cross all boundaries, and within an industry IoT becomes the building automation tool to make it all work.

Revolving Security

Revolving Security

After revolving doors emerged on the architectural scene in the late 19th century, they were very much in vogue and favored as a way to provide building access stylishly.

Face Recognition Start-up Says It Can Identify Terrorists

Face Recognition Start-up Says It Can Identify Terrorists

An Israeli start-up suggests that their facial recognition software can determine which people may be terrorists.

Chicago Police use Big Data to Predict Gun Violence

Chicago Police use Big Data to Predict Gun Violence

Chicago’s police department is implementing new ways to keep the city free of gun violence.

Iris Readers Enhance Security of Access Control Systems

Iris Readers Enhance Security of Access Control Systems

A new generation of iris reader technology and products is about to change the landscape for access control.

Digital Edition

  • Security Today Magazine - May June 2019

    May/June 2019

    Featuring:

    • A Healthcare Revolution
    • Security Beyond the Field
    • Secure Your Engines
    • One Step Ahead
    • Elevating Data Security

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety