Networking Security


Holiday Security Tips for Malls or Outdoor Shopping Areas

Holiday Security Tips for Malls or Outdoor Shopping Areas

The holiday shopping season is here, let’s not forget that we are in COVID-19 pandemic and health officials continue to repeat their messages about the importance of masks, adequate social distancing, and frequent handwashing.

Deployment During the Pandemic

Deployment During the Pandemic

Prior to the COVID-19 pandemic, the rate of cloud adoption was growing steadily. Since March, however, when “shelter-in-place” orders began sweeping the nation, we’ve seen cloud computing usage skyrocket.

Uniting the Physical and the Digital

Uniting the Physical and the Digital

As the Internet of Things (IoT) becomes mainstream, companies are delving into the ramifications of adoption, including its benefits, challenges, and opportunities--not least, the implications to security and cybersecurity.

BriefCam Announces Video Analytics Innovation

BriefCam has announced a significant new capability to its product portfolio with v5.6.1 of its innovative and extensible video content analytics platform.

Remote Working and VPN

Remote Working and VPN

In this pandemic of coronavirus, all organizations have shifted from office work to remote work. By saying that, you must have heard about VPNs, and how they improve security and privacy.

Forming Real Bonds

Forming Real Bonds

Artificial intelligence has been in the headlines a lot recently. It will help save mankind or usher in the robot apocalypse, depending on which article you read.

Secure Your Containers

Development and deployment of container-based software has become a popular movement in technology.

Taking on Security Automation

Taking on Security Automation

Not only does modern software architecture create a broader attack surface area, the accelerated DevOps methodology makes it harder to detect and remediate vulnerabilities.



Spotting Signs Your IT is Out of Date

This evolution not only keeps the IT department in a constant state of change, but also dramatically changes the way the overall business must adapt to stay competitive.

Quality Control is Everything

Quality Control is Everything

In today’s world, there are a myriad of different manufacturers that produce similar products and there are so many options available to customers.

Why Are SMBs so Worried?

Why Are SMBs so Worried?

Cloud storage is most used by small-and-medium businesses (SMBs). The reason is that it comes with many benefits for organizations in terms of flexibility and more importantly productivity.

Data Privacy Requires a Security Response

Recent hacks into databases of some of the world’s biggest corporations and government organizations put the personal information of billions of people at risk.

Smart City Technologies

Smart City Technologies

Two of the biggest trends today, particularly in the security surveillance and IoT realms, are border security and the emergence of local governments transforming their communities into smart cities.

Ushering in a New Era

Ushering in a New Era

Privacy issues continue to dominate headlines as the world’s biggest companies are being challenged on the ways they collect and use people’s data. Consumers are growing more concerned about how their activities are being tracked across the web as companies sell information to advertisers for a profit.

Overcoming the Challenges of SecOps Implementation

Overcoming the Challenges of SecOps Implementation

Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.

Plan Might Have a Weakness

Plan Might Have a Weakness

Cybersecurity and physical security no longer exist in two different worlds. Each now supports and depends on the other as part of a comprehensive risk and liability management program.

Changing the SIEM Game

For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.

A Word of Caution

A special word of caution needs to be emphasized when changing over to mobile systems. Many legacy access control systems require the use of backend portal accounts.

Advanced VMS and Analytics

The shipping industry is being tasked to improve productivity, increase speed of operations and mitigate risk from new and potentially devastating forms of attack from both external and internal potential threats.

Five Biggest Security Myths Busted

Five Biggest Security Myths Busted

There are a number of common misconceptions about endpoint security.

  • Securing Entertainment Venues Securing Entertainment Venues

    One thing entertainment venues, sports stadiums and theme park officials want to accomplish is getting people back into their seats. That is happening today—but not without understanding and technology. In this episode, AJ DeRosa shares his insight on how COVID-impacted businesses are able to face safety and security issues with confidence and technology. We also discuss visitor expectations and how venue officials can ensure their space is secure as they welcome visitors back.

Digital Edition

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety