Networking Security


Lookingglass Integrates iSIGHT's Cyber Threat Analysis

Lookingglass Cyber Solutions, a cyber security company whose platform delivers emerging network threat intelligence, will integrate iSIGHT’s industry leading cyber intelligence with the Lookingglass' cyber threat analysis platform, ScoutVision.

Study: Many IT Professionals Believe Cyber Security Has Increased

A study by nCircle found that 76 percent of security professionals believe U.S. cyer security has increased over the last 12 months.

Video Security

Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.

From The Edge To The Cloud

System designers must ensure that sufficient storage is available to archive video for the required length of time and at the required frame rate and resolution.

Now is the Time to Upgrade Your VMS Software

In the realm of security and video surveillance, as in other markets, “new and improved” is in demand. The latest version of any product can do more, do it better, do it easier -- and customers are conditioned to stay current with the latest technologies.

Fastmetrics Implements Corero DDoS Defense Technology

Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.

The Perfect Fit

The business proposition of Plato’s Closet, a popular consignment store chain, differs from those of upscale department stores and big box retail outlets.

IP Video Is The Answer

The Nebraska Medical Center is the largest healthcare facility in the state, with 624 licensed beds. Administrators wanted to improve the safety of the facility’s at-risk patients who require 24/7 observation, while also reducing staff and overhead requirements.



Safety On The Railway

How does one of the largest railway companies in the world protect its passengers from terrorist attacks and sabotage?

To The Rescue

Several months ago, I noticed a set of tire tracks running across my front lawn. Knowing that neither my wife nor I enjoy offroading on our yard, I did some investigative work.

What's New At The Edge

Even though the first product launch of a network camera happened in 1996, it was a little more than a decade ago before the device began appearing in the physical security arena.

Into The Air

A few years back, a number of leading IP surveillance manufacturers got together to discuss the development of an organization that would promote and develop IP standards.

Research: Axis Communications Now Top Global Surveillance Camera Provider, Even When Including Analog

Axis Communication, a video-surveillance company, is now ranked as the number one global manufacturer of surveillance cameras in the latest IMS Research report.

Researchers Building Computer System That Can Protect Itself From Online Attacks

In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself.

Report Says Cybercriminals Targeted Users of Major Social Networking Sites in April

GFI Software, a provider of web-monitoring software and security, has released a report citing the 10 most prevalent cyber-threats detected in April. The report says cybercriminals exploited people who use social networking sites Facebook, Twitter, Tumblr and Pinterest to spread malware and spam surveys.

Merck Pharmaceuticals Installs Arecont Vision Megapixel Cameras at Mexico Facility

Merck Pharmaceuticals has installed an Arecont Vision megapixel technology solution at their new facility in Mexico to help ensure that all activity and incidents are captured in high-resolution video.

Anti-Malware Lab Report Says Four out of Five Malware Samples are Trojans

Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.

Report: Mobile Use of Social Networking Becoming Preferred Way to Infect Mobile Devices

AVG Technologies recently released its Q1 2012 Community Powered Threat Report. The report highlights the growing use of mobile devices to connect with social networks and how this is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices running Android.

Nebraska Photo Studio Remotely Monitors Five Locations

Video surveillance and remote monitoring company mobiDEOS Inc. announces that Arnold Clark Photography, one of the oldest and largest photography studios in Omaha, Nebraska, uses MobileCamViewer to monitor activity and protect retail interests at its downtown business location.

Military Explores Expansion of Open Source Technology

Open source technology can help military and other government entities modify software quickly without sacrificing data security. That flexibility, coupled with lower overall cost, is helping fuel a rapid increase in government adoption of open source software, advocates say.

  • Securing Entertainment Venues Securing Entertainment Venues

    One thing entertainment venues, sports stadiums and theme park officials want to accomplish is getting people back into their seats. That is happening today—but not without understanding and technology. In this episode, AJ DeRosa shares his insight on how COVID-impacted businesses are able to face safety and security issues with confidence and technology. We also discuss visitor expectations and how venue officials can ensure their space is secure as they welcome visitors back.

Digital Edition

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety