The new licensing program is called BlackBerry Secure and aims to protect devices with BlackBerry security technology.
The FBI gives basic steps to mitigate the threat of W-2 theft.
- By Sydny Shepard
- Mar 08, 2018
For the first time in two decades, Tennessee is boosting security standards for courthouses across the state.
- By Sydny Shepard
- Mar 07, 2018
The European Union will begin to enforce strict data security starting in May. Here's what you should know.
- By Sydny Shepard
- Mar 07, 2018
With this award, SIA honors Marcella for his work in strengthening education programming for the security industry through SIA Education.
Proactive data monitoring plays a critical role in securing sensitive business information.
Cybersecurity was found to be the top technology used by healthcare facilities.
- By Sydny Shepard
- Mar 06, 2018
One of the ten attacks can create "artificial choas" by sending a fake emergency alert to cell phone users.
- By Sydny Shepard
- Mar 06, 2018
A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.
- By Sydny Shepard
- Mar 05, 2018
The suspected shooter is still at large, and is considered to be armed and dangerous.
- By Jessica Davis
- Mar 02, 2018
Securitas has agreed to acquire the division Kratos Public Safety and Security from Kratos Defense & Security Solutions, Inc. The purchase price is approximately MSEK 550 (MUSD 69) on a cash and debt-free basis. The acquisition is expected to be neutral to Securitas earnings per share in 2018 and 2019, and accretive as of 2020.
The growth of technology is everywhere. What’s next for the security industry? I think the next innovation poised to transform the security industry will be deep learning or artificial intelligence (AI), which is a system that learns by looking at masses of data.
- By Ralph C. Jensen
- Mar 01, 2018
Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.
- By Mark Clifton
- Mar 01, 2018
When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.
- By Peter Boriskin
- Mar 01, 2018
The safety and security of visitors and staff and the protection of the Musical Instrument Museum's extensive collection is an essential aspect of fulfilling its mission. With an active facility during both day and evening hours, the museum sought to upgrade its outdoor security surveillance system to improve the quality of the images around the clock.
- By Sydny Shepard
- Mar 01, 2018
The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses.
- By Mohammed Murad
- Mar 01, 2018
Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.
- By Joe Morgan
- Mar 01, 2018
It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.
- By Shawn Guan
- Mar 01, 2018
The security landscape is constantly evolving with new products and technologies. With the introduction of these new and improved technologies, it is inevitable that products which have existed within the industry for years may no longer be the go-to choice when it comes to selecting system equipment.
- By Roscoe Coffman
- Mar 01, 2018
The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.
- By Courtney Dillon Pedersen
- Mar 01, 2018