As the Internet of Things (IoT) becomes mainstream, companies are delving into the ramifications of adoption, including its benefits, challenges, and opportunities--not least, the implications to security and cybersecurity.
- By Steven Turney
- Jul 30, 2020
BriefCam has announced a significant new capability to its product portfolio with v5.6.1 of its innovative and extensible video content analytics platform.
In this pandemic of coronavirus, all organizations have shifted from office work to remote work. By saying that, you must have heard about VPNs, and how they improve security and privacy.
- By Susan Alexandra
- Jun 02, 2020
Artificial intelligence has been in the headlines a lot recently. It will help save mankind or usher in the robot apocalypse, depending on which article you read.
- By Dave Mayne
- Apr 09, 2020
Development and deployment of container-based software has become a popular movement in technology.
- By Ambuj Kumar
- Mar 01, 2020
Not only does modern software architecture create a broader attack surface area, the accelerated DevOps methodology makes it harder to detect and remediate vulnerabilities.
- By Felicia Haggarty
- Dec 01, 2019
This evolution not only keeps the IT department in a constant state of change, but also dramatically changes the way the overall business must adapt to stay competitive.
- By Jorge Del Prado Lera
- Dec 01, 2019
In today’s world, there are a myriad of different manufacturers that produce similar products and there are so many options available to customers.
- By Michael Stoll
- Oct 01, 2019
Cloud storage is most used by small-and-medium businesses (SMBs). The reason is that it comes with many benefits for organizations in terms of flexibility and more importantly productivity.
- By François Amigorena
- Oct 01, 2019
Recent hacks into databases of some of the world’s biggest corporations and government organizations put the personal information of billions of people at risk.
- By Mohammed Murad
- Oct 01, 2019
Two of the biggest trends today, particularly in the security surveillance and IoT realms, are border security and the emergence of local governments transforming their communities into smart cities.
- By Kevin Taylor
- Oct 01, 2019
Privacy issues continue to dominate headlines as the world’s biggest companies are being challenged on the ways they collect and use people’s data. Consumers are growing more concerned about how their activities are being tracked across the web as companies sell information to advertisers for a profit.
- By Neil Huntingdon
- Oct 01, 2019
Security Operations shifts security to the left to ensure that security is met at every level, making it both a necessity and a challenge.
- By Gilad David Maayan
- Aug 06, 2019
A special word of caution needs to be emphasized when changing over to mobile systems. Many legacy access control systems require the use of backend portal accounts.
- By Scott Lindley
- Aug 01, 2019
Cybersecurity and physical security no longer exist in two different worlds. Each now supports and depends on the other as part of a comprehensive risk and liability management program.
- By Greg Schreiber
- Aug 01, 2019
For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.
- By Mike Sprunger
- Aug 01, 2019
The shipping industry is being tasked to improve productivity, increase speed of operations and mitigate risk from new and potentially devastating forms of attack from both external and internal potential threats.
- By Aluisio Figueiredo
- Aug 01, 2019
There are a number of common misconceptions about endpoint security.
- By Jerry Young
- Apr 29, 2019
Learn about the key factors to pay attention to when selecting a provider of network vulnerability assessment services.
Millions of video surveillance cameras around the world are losing money.
- By Scott Seraboff
- Mar 01, 2019