Internet-connected vehicles becoming target for tech-savvy cyber criminals.
- By Ginger Hill
- Aug 05, 2015
Windows 10 features a number of security updates and settings that are important to know, even if you didn’t read the fine print.
- By Matt Holden
- Aug 05, 2015
Seamless integration between Pelco’s powerful and intuitive VideoXpert Video Management System and the comprehensive suite of video analytics capabilities of Agent Vi’s savVi software delivers rapid results and an unparalleled user experience.
Security Center unifies security operations across waste and water facilities, police and fire departments, city hall, libraries, park and recreation buildings, public works facilities, the regional airport and others.
New technology, listings, training and software expand dealer support and offer more solutions for traditional and non-traditional applications.
Merger produces the largest U.S.-owned security company.
Protection 1 Team Members Volunteered at Local Organizations across the Country for “All for 1 Day."
Symmetry CompleteView VMS and Symmetry PowerProtect NVRs offer faster processes, performance gains and increased storage.
New location to support rapid market growth, tap into area’s engineering expertise.
Some public Wi-Fi hotspots are provided by con artists.
- By Matt Holden
- Aug 04, 2015
Recreational drones could be used by adversaries to attack the United States.
- By Ginger Hill
- Aug 04, 2015
Intersecting business into the professionalization of information security debate.
- By Martin Zinaich
- Aug 04, 2015
Gun violence became a personal issue due to Lafayette, Louisiana movie theater shooting on July 23, 2015 during the movie Trainwreck.
- By Ginger Hill
- Aug 03, 2015
The funding was led by TPG Growth.
- By Matt Holden
- Aug 03, 2015
5 steps to help professionalize the cybersecurity workforce.
- By Martin Zinaich
- Aug 03, 2015
In recent years, the cruise industry has received a lot of attention from the news media regarding serious security issues onboard its vessels, ranging from people falling overboard to sexual assaults.
- By Jumbi Edulbehram
- Aug 01, 2015
Technology is amazing stuff. However, some of the greatest threats that today’s businessman or woman faces is a cyberattack. Just count the number of breaches in the last couple of years; you know what I mean.
- By Ralph C. Jensen
- Aug 01, 2015
With the increased focus on home automation and associated “smart home” devices, it is incumbent on security dealers, installers and integrators to do more than simply sell security products.
- By Larry Goldman
- Aug 01, 2015
Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.
- By Mitchell Kane
- Aug 01, 2015
Today, Dedicated Micros continues to conceptualize and develop ground breaking video surveillance solutions to meet industry needs.
- By Neil Robertson
- Aug 01, 2015