Millions of personal data records are vulnerable after a breach was detected at LabCorp.
- By Sydny Shepard
- Jul 19, 2018
Sooner or later, a smartphone app will be able to unlock your car. But what are the potential security issues that come with this new technology?
- By Andy Allan
- Jul 18, 2018
The Crimson Tide will be introducing metal detectors to football games starting in the fall.
- By Sydny Shepard
- Jul 18, 2018
IBM Security and Ponemon Institute have released their study on the average cost of a data breach.
- By Sydny Shepard
- Jul 17, 2018
Amazon Prime Day is here! Here are the best discounts on security products.
- By Sydny Shepard
- Jul 16, 2018
Qualified security guars at North Shore University Hospitals will now be armed amid shooting incidents in New York.
- By Sydny Shepard
- Jul 16, 2018
Leading Ohio-based manufacturers’ rep firm joins forces with top security rep firm in the Great Lakes region to offer communication infrastructure, A/V and security solutions.
A threat assessment program create standards for teachers and peers to identify threats before they happen.
- By Sydny Shepard
- Jul 13, 2018
Provides integrators with greater flexibility and efficiency
- By Sydny Shepard
- Jul 12, 2018
Office security is always important, but in the summer, it can get more lax.
- By Katie Torrance
- Jul 12, 2018
Whether your title is Security Director or you just have the responsibilities of one, there’s a lot riding on your shoulders.
Looking at examples of how municipalities or governments protect these assets can help businesses plan as well. Critical infrastructure for businesses often shares similar needs with municipalities: how do we best protect servers, structures and the people who live and work in private buildings?
- By Peter Boriskin
- Jul 11, 2018
Conversations about what can be done to keep violent weapons and dangerous materials from falling into the wrong hands continue to dominate the political discussion, leaving communities wondering about what they can do to prevent the next school or church attack.
- By Stephanie Douglas
- Jul 11, 2018
Even if you don’t have a Facebook account, you have undoubtedly heard the reports about how Cambridge Analytica accessed the personally identifiable information (PII) of up to 87 million users over a period of several years.
- By Christian Morin
- Jul 11, 2018
Having both specific and shared goals is what makes medical centers quite unique to security. Rarely are two buildings alike, yet they all have common needs, requirements and goals.
As with all major sporting and entertainment events, the goal is for everyone using a ticket to have purchased it from the authorized ticketing entity and to have a seamless experience both when they pick it up and when they present it at the venue.
- By Cesare Paciello
- Jul 11, 2018
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT.
Today’s facility operators must prepare for virtually any event from vandalism to a terrorist attack. With facilities ranging in size and use—from an emergency communications center to a multi-family apartment building—there’s no readily available one-size-fits-all security plan.
- By Dana Pruiett
- Jul 11, 2018
While the threat of terrorists planning to attack soft targets, such as stadiums, increases, stadium security professionals must look for the weak points throughout their facilities to determine where fanatics are most likely to assail.
With more than 120 permanent network cameras in place at Volunteer Stadium and Howard J. Lamade Stadium, Little League International works to add new technologies each year to keep the installation as secure as possible
- By Courtney Dillon Pedersen
- Jul 11, 2018