Emerging Technologies


It

Industry Professional

It's a BASH

A vehicle with the ability to remotely monitor and record has been rolled out for city wide use. The prototype, created by Dotworkz, was designed for use at construction sites, high profile events and even search and rescue missions.

Body Cam Footage: Pokémon Go Player Collides with Police Car

Body Cam Footage: Pokémon Go Player Collides with Police Car

Baltimore Police Department released video of a car colliding with a parked police car while the driver was playing Pokémon Go.

Texas Universities Rush to Finalize Campus Carry Policies

Texas Universities Rush to Finalize Campus Carry Policies

On August 1, 2016 S.B. 11, otherwise known as the campus carry law, will go into effect.

Detroit Police Arrest Four for Social Media Threats

Detroit Police Arrest Four for Social Media Threats

Four men threatened on Facebook to kill police officers.

Background Checks Rise 40 percent in June

Background Checks Rise 40 percent in June

After the deadliest mass shooting in U.S. history, federal background checks for gun purchases increased in June.

Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

Security Products Dad Will Love

Security Products Dad Will Love

Father’s Day is just around the corner; give Dad the gift of security with one of these products.



Hackers Take Over Outlander PHEV

Hackers Take Over Outlander PHEV

A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm.

Facebook Vulnerability Allows Hacker to Alter Conversations

Facebook Vulnerability Allows Hacker to Alter Conversations

A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.

Solid ROI Metrics Support Case for PIAM

Solid ROI Metrics Support Case for PIAM

By definition, PIAM is an end-to-end solution that manages identities, compliance and events across disparate physical security systems.

INDUSTRY FOCUS

Always Something New

As technology in every industry grows by leaps and bounds, there will always be something new to talk about. However, the Internet of Things seems to cross all boundaries, and within an industry IoT becomes the building automation tool to make it all work.

Revolving Security

Revolving Security

After revolving doors emerged on the architectural scene in the late 19th century, they were very much in vogue and favored as a way to provide building access stylishly.

Face Recognition Start-up Says It Can Identify Terrorists

Face Recognition Start-up Says It Can Identify Terrorists

An Israeli start-up suggests that their facial recognition software can determine which people may be terrorists.

Chicago Police use Big Data to Predict Gun Violence

Chicago Police use Big Data to Predict Gun Violence

Chicago’s police department is implementing new ways to keep the city free of gun violence.

Iris Readers Enhance Security of Access Control Systems

Iris Readers Enhance Security of Access Control Systems

A new generation of iris reader technology and products is about to change the landscape for access control.

Surveillance System Allows Police to View Any Camera

Surveillance System Allows Police to View Any Camera

A new surveillance system could give police departments access to any camera that isn’t password protected.

Financial Data of an Entire NBA Team Compromised

Financial Data of an Entire NBA Team Compromised

The Milwaukee Bucks’ financial data has been compromised in what the NBA is calling a “serious security incident.”

Android Security Hole Grows

Android Security Hole Grows

Security researchers at Skycure have found that 95.4 percent of Android devices are vulnerable to an attack

The Scary Wi-Fi Name that Delayed a Flight

The Scary Wi-Fi Name that Delayed a Flight

An Australian-based airline was forced to delay a flight after someone decided to take Wi-Fi naming to a threatening level.

Digital Edition

  • Security Today Magazine - September 2019

    September 2019

    Featuring:

    • Deploying IoT Devices
    • Averting Workplace Violence
    • Automating Emergency Communication
    • Security by Design
    • The Access Solution

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety