The West Coast resort has added two ‘bots to the force, with at least one more planned.
- By Jordan Lutke
- Sep 12, 2018
- By Ralph C. Jensen
- Sep 11, 2018
ABC is tightening security at its Sydney headquarters after a man infiltrated security and assaulted an employee.
- By Sydny Shepard
- Sep 11, 2018
Florida officials are boosting security at and around airports for the anniversary of the Sept. 11 attacks.
- By Sydny Shepard
- Sep 11, 2018
Major threats around the world impend through the internet at alarming rates.
- By Michael Volkmann
- Sep 10, 2018
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All of these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country.
Study finds the growth of smartphone payments will increase the use of biometric security measures on mobile devices.
Three victims are dead and at least two more have been injured in an active shooter situation that took place in downtown Cincinnati this morning.
- By Jessica Davis
- Sep 06, 2018
Businesses will be allocating more funds to their IT sector next year, with most of the budget going to cybersecurity measures.
- By Sydny Shepard
- Sep 06, 2018
Cybersecurity is something everyone should be concerned about. Every business must work to protect sensitive data and personal privacy. Here are seven indispensable cybersecurity tips for any and everyone on the internet.
- By Greg Robinson
- Sep 05, 2018
Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security.
- By Ralph C. Jensen
- Sep 01, 2018
Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.
- By Paul Garms, Sean Murphy
- Sep 01, 2018
Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.
- By Ralph C. Jensen
- Sep 01, 2018
As demand for controlled access communities continues to grow, so does the demand for secure and flexible access solutions.
- By Tom Potosnak
- Sep 01, 2018
In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.
- By Vince Ricco
- Sep 01, 2018
One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages
- By Ian Lowe, Mark Robinton
- Sep 01, 2018
By definition, cash-in-transit (CIT) is the physical transfer of banknotes, coins, credit cards and items of value from one location to another.
- By Travis Ferry
- Sep 01, 2018
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.
There is little question that the Southern U.S. border is porous; people stream into the United States at will. There is a great need for security; and the best technology should be used.
- By Ralph C. Jensen
- Sep 01, 2018