Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.
Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.
VSS Monitoring has earned the 2012 Global Competitive Strategy Leadership Award in the infrastructure packet broker market from Frost & Sullivan.
Lookingglass Cyber Solutions, a cyber security company whose platform delivers emerging network threat intelligence, will integrate iSIGHT’s industry leading cyber intelligence with the Lookingglass' cyber threat analysis platform, ScoutVision.
A study by nCircle found that 76 percent of security professionals believe U.S. cyer security has increased over the last 12 months.
System designers must ensure that sufficient storage is available to archive video for the required length of time and at the required frame rate and resolution.
Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.
In the realm of security and video surveillance, as in other markets, “new and improved” is in demand. The latest version of any product can do more, do it better, do it easier -- and customers are conditioned to stay current with the latest technologies.
Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.
The business proposition of Plato’s Closet, a popular consignment store chain, differs from those of upscale department stores and big box retail outlets.
Several months ago, I noticed a set of tire tracks running across my front lawn. Knowing that neither my wife nor I enjoy offroading on our yard, I did some investigative work.
How does one of the largest railway companies in the world protect its passengers from terrorist attacks and sabotage?
The Nebraska Medical Center is the largest healthcare facility in the state, with 624 licensed beds. Administrators wanted to improve the safety of the facility’s at-risk patients who require 24/7 observation, while also reducing staff and overhead requirements.
Even though the first product launch of a network camera happened in 1996, it was a little more than a decade ago before the device began appearing in the physical security arena.
A few years back, a number of leading IP surveillance manufacturers got together to discuss the development of an organization that would promote and develop IP standards.
Axis Communication, a video-surveillance company, is now ranked as the number one global manufacturer of surveillance cameras in the latest IMS Research report.
In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself.
GFI Software, a provider of web-monitoring software and security, has released a report citing the 10 most prevalent cyber-threats detected in April. The report says cybercriminals exploited people who use social networking sites Facebook, Twitter, Tumblr and Pinterest to spread malware and spam surveys.
Merck Pharmaceuticals has installed an Arecont Vision megapixel technology solution at their new facility in Mexico to help ensure that all activity and incidents are captured in high-resolution video.
Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.