Networking Security


Vulnerability Assessment Vendors: How to Find the Right One

Vulnerability Assessment Vendors: How to Find the Right One

Learn about the key factors to pay attention to when selecting a provider of network vulnerability assessment services.

Secure Storage in the Age of Edge Computing and the Cloud

Secure Storage in the Age of Edge Computing and the Cloud

Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.

Automating Critical Environments

Automating Critical Environments

As key stakeholders look to implement AI into their workflow, many find that security and safety is a commonsense place to begin.

Are You Throwing Money Away

Are You Throwing Money Away

Millions of video surveillance cameras around the world are losing money.

The Future Looks a Lot Like You and Me

The Future Looks a Lot Like You and Me

From simple photo IDs of the past to 2D barcodes and the now ubiquitous use of video cameras, businesses, schools and venues are constantly looking for better ways to protect people and property.

Unlocking the Benefits

Unlocking the Benefits

The Internet of Things (IoT) promises greater connectivity, which, when properly leveraged, can provide invaluable insight into our organizations and our operational environments. In the security sector, increased connectivity between sensors and systems gives us access to more data than we thought possible even just a few years ago.

Deploying a Cloud Strategy

Deploying a Cloud Strategy

There’s enormous opportunity for all enterprises in the cloud, and those in the middle market are taking note.

Smarter Infrastructure

Smarter Infrastructure

Smart city initiatives are growing across the globe, as leaders look to increase security and intelligence across metropolitan environments.



The Next Generation

Hardware Security Modules, or HSMs, protect against insider and external threats by delivering confidentiality for encryption keys in a physically hardened appliance.

Challenges and Solutions

Challenges and Solutions

Technological advancements are resulting in trends and movements that improve the quality of life and business.

Networking Technology is Changing

No one will argue that the network has been one of the greatest evolutions in time. Think of it, everything that you used to do by hand, you can now do via computer. Well, almost everything.

Shifting Towards the Cloud

Shifting Towards the Cloud

Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.

Major Security Flaw Found in Bluetooth Chips

Enterprise Security: Major Flaws Found in Bluetooth Chips

Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.

Creating Cloud Platforms

Creating Cloud Platforms

Cloud technologies are giving people access through their mobile phones and other devices to a variety of new experiences, while making their workplaces smarter and more data-driven.

Flying Under the Radar

Flying Under the Radar

With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals.

Just Say “Yes” to the Cloud

Just Say “Yes” to the Cloud

Cloud technology began with the concept of grid computing— the idea that we could replicate the way a power grid in a country was set up.

Consider Data Security

Consider Data Security

Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.

Cyber and Security

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.

How to Protect Your Business from Amazon

How to Protect Your Business from Amazon

If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.

Your Top Data-Exposure Risk: Employees

People are fallible creatures. As the saying goes, nobody’s perfect.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Busy South Africa Building Integrates Custom Access Control System

    Nicol Corner, based in Bedfordview, Johannesburg, South Africa, is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. This is the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption. Nicol Corner (Pty) LTD has developed a landmark with sophisticated design and unique architecture by collaborating with industry-leading partners and specifying world-class equipment throughout the project. This includes installing a high-spec, bespoke security and access control system. Read Now

  • Only 13 Percent of Research Institutions Are Prepared for AI

    A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions. Read Now

  • Survey: 70 Percent of Organizations Have Established Dedicated SaaS Security Teams

    Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey Report: 2025 CISO Plans and Priorities released today by the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3