Among the common types of cybersecurity attacks perpetrated on enterprises, arguably none are as sophisticated, effective or lucrative as ransomware is today.
- By Moshe Shlisel
- Mar 01, 2020
The Chickasaw Nation is a federally recognized, independent Native American nation located in south-central Oklahoma. The nation’s territory covers more than 7,600 square miles and is home to a population of nearly 70,000.
- By Ralph C. Jensen
- Mar 01, 2020
Development and deployment of container-based software has become a popular movement in technology.
- By Ambuj Kumar
- Mar 01, 2020
ERDC enlisted the services of M3 Technology Group, an audio-visual integrator based in Nashville, Tennessee, to create a unique audio-visual experience not seen in other government facilities.
- By Michael Callahan
- Mar 01, 2020
As security threats grow in complexity and scale, organizations are spending major resources to address the threats and minimize risk, including hiring top security talent and purchasing sevenfigure security solutions.
- By Marcus Carey
- Mar 01, 2020
As the cyber threat landscape has matured and evolved, cybersecurity incidents have become a regular occurrence.
Officials in Cuyahoga County, Ohio are looking to digitize and automate paper-based processes at several agencies through a program that encourages governments, startups and small businesses to collaborate on solutions.
- By Stephanie Kanowitz
- Mar 01, 2020
Commercial buildings face a universal challenge: how to manage security without encroaching on tenant privacy, comfort and experience.
Data on OTAs and prototypes. The House proposed an annual reporting requirement on how the Defense Department is using OTAs.
- By Lauren C. Williams
- Mar 01, 2020
When you consider today’s smartphones, the phone part is almost ancillary. It’s really the apps and the advanced optics that drive the purchase.
- By Joe Morgan
- Mar 01, 2020
Dayton, Ohio, has seen a lot of ups and downs over the years. The city is more than a survivor as businesses find a way to keep their doors open, and today, even attract some very interesting tech firms.
- By Ralph C. Jensen
- Mar 01, 2020
As the city began strategically deploying surveillance cameras throughout Atlanta, APF invested $350,000 to create the cuttingedge Loudermilk Operation Shield Video Integration Center (VIC).
- By Kevin Taylor
- Mar 01, 2020
When it comes to government contracting, security spending is big business—and small business too.
- By Ben Vaught
- Mar 01, 2020
Artificial Intelligence (AI) continues to gain momentum every day, and it is already poised to augment and enrich many aspects of our business and personal lives.
There are essential elements that great integrators and managed service providers have that set them apart from the competition.
- By Dan Rothrock
- Mar 01, 2020
The Internet of Things (IoT) has landed in airport operations. More than 20 billion end devices are already networked via the Internet, and there will likely be three times more than this by 2025, according to Statista.
- By Hartmut Schaper
- Mar 01, 2020
Security is a top priority at healthcare facilities across the country, but developing and deploying an effective healthcare security strategy is a challenging process.
- By Pat Scheckel
- Mar 01, 2020
There are good reasons that video surveillance is mandated for any casino operation by both federal and state gaming authorities – it has proven to be an effective tool to help ensure safety,
- By Jason Oakley
- Mar 01, 2020
Once you have made the decision to install a security entrance, you may find that your search for a provider brings you to used turnstiles, revolving doors or portals for sale. Naturally, these tend to be cheaper than new products.
- By Kurt Measom
- Mar 01, 2020
CYBERCOM has created a Twitter account with thousands of followers to publicize malware samples it shares with cybersecurity companies. Internal documents explain that it’s part of a defensive (and offensive) strategy.
- By Haley Samsel
- Feb 27, 2020