Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.
- By Richard Diver
- Mar 01, 2019
From simple photo IDs of the past to 2D barcodes and the now ubiquitous use of video cameras, businesses, schools and venues are constantly looking for better ways to protect people and property.
- By Denis Petrov
- Mar 01, 2019
As key stakeholders look to implement AI into their workflow, many find that security and safety is a commonsense place to begin.
- By Brent Boekestein
- Mar 01, 2019
There’s enormous opportunity for all enterprises in the cloud, and those in the middle market are taking note.
- By Andreas Pettersson
- Feb 01, 2019
The Internet of Things (IoT) promises greater connectivity, which, when properly leveraged, can provide invaluable insight into our organizations and our operational environments. In the security sector, increased connectivity between sensors and systems gives us access to more data than we thought possible even just a few years ago.
- By Jimmy Palatsoukas
- Feb 01, 2019
Smart city initiatives are growing across the globe, as leaders look to increase security and intelligence across metropolitan environments.
- By Brandon Reich
- Dec 01, 2018
No one will argue that the network has been one of the greatest evolutions in time. Think of it, everything that you used to do by hand, you can now do via computer. Well, almost everything.
- By Ralph C. Jensen
- Dec 01, 2018
Technological advancements are resulting in trends and movements that improve the quality of life and business.
- By Abhishek Iyer
- Dec 01, 2018
Hardware Security Modules, or HSMs, protect against insider and external threats by delivering confidentiality for encryption keys in a physically hardened appliance.
- By Anand Kashyap
- Dec 01, 2018
Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.
- By Jeff Whitney
- Dec 01, 2018
Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
- By Sydny Shepard
- Nov 05, 2018
Cloud technologies are giving people access through their mobile phones and other devices to a variety of new experiences, while making their workplaces smarter and more data-driven.
- By Hilding Arrehed
- Oct 01, 2018
With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals.
- By Julian Weinberger
- Sep 01, 2018
Healthcare institutions face a variety of cybersecurity challenges, and the threats continue to grow and evolve. Hospitals are particularly vulnerable to data breaches and ransomware attacks because of the high value of healthcare data
- By Sheila Loy
- Sep 01, 2018
People are fallible creatures. As the saying goes, nobody’s perfect.
- By Jason Cronk
- Sep 01, 2018
If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.
- By Scott Lindley
- Sep 01, 2018
Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.
- By Ralph C. Jensen
- Sep 01, 2018
Google Chrome is largely considered one of the most security-conscious browsers, but recent headlines revealed some of its weaknesses.
- By David Pearson
- Sep 01, 2018
Cloud technology began with the concept of grid computing— the idea that we could replicate the way a power grid in a country was set up.
- By Peter Boriskin
- Sep 01, 2018
Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.
- By Paul Garms, Sean Murphy
- Sep 01, 2018