Industry’s top honor in the digital space, recognizing outstanding social media, web and mobile initiatives among consumer and b2b magazines, according to PRWeb.
Loretta Lynch has announced a new body camera pilot program.
- By Matt Holden
- May 01, 2015
Security managers are more aware than ever that information security requires a layered approach with components addressing every point of intrusion on the corporate network.
- By Julie Olenski
- May 01, 2015
In Utah, locals refer to the Orem/Provo area as Happy Valley. It is a quiet, conservative college town, but all this doesn’t stand in the way of building a booming business.
- By Ralph C. Jensen
- May 01, 2015
It’s been two weeks and it’s time for me to introduce the latest video surveillance technology to the daycare center. They need to install IP cameras, so I can clearly see what that baby girl is doing, and make sure she is treated like I expect my granddaughter to be treated.
- By Ralph C. Jensen
- May 01, 2015
Mastering the alphabet used to be as simple as learning your ABCs. Not anymore. A whole new alphabet has been created for the world of analog video. Don’t try to sing this one to the “Alphabet song” we all grew up with. It doesn’t work. Trust me. I just spent 15 minutes trying.
- By Gary Perlin
- May 01, 2015
There has been a noticeable increase in mass-produced, lowcost cameras available in the security industry. Low prices can be hard to resist, especially considering the tight budgets faced by government agencies at all levels.
- By Steve Gorski
- May 01, 2015
Beverly Hills, Calif., has been glamorized in countless film and television depictions as the home of the wealthy and the famous.
- By Brian Carlson
- May 01, 2015
During the past 10 years there have been some magnificent technological innovations in the security industry, but the pace of change has never been higher.
- By Ralph C. Jensen
- May 01, 2015
Everybody knows the old saying that the only things certain in life are death and taxes. But, alarm dealers understand that there’s a third certainty: false alarms.
- By Robert Ogle
- May 01, 2015
When you’re conducting a therapy session, it’s virtually impossible to be fully engaged with the client and be an objective observer of your own interactions at the same time.
- By John Bartolac
- May 01, 2015
The fierce competition in the hospitality market has created a need to think creatively in order to increase the number of visitors. Therefore, Copenhagen Zoo constantly looks for new ways to give their customers an interesting and out-of-the-box experience.
- By Courtney Dillon Pedersen
- May 01, 2015
Now more than ever, major network vulnerabilities are making national and international news headlines.
- By Madeline Domma
- May 01, 2015
Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.
- By Randy Smith
- May 01, 2015
Cities are a challenge to secure and manage—they encompass a wide geographic footprint and include a multitude of key stakeholders comprising local, state and federal agencies along with a variety of private business entities and public organizations.
Increased security concerns, availability of IP networks, camera sprawl and improvement in video content analytics are all contributing to a rapid growth in the amount of video surveillance data that federal agencies are gathering today.
- By Michael Gallant
- May 01, 2015
The security industry is under attack by buzzwords, and the Internet of Things (IoT) is one of a few leading the assault.
Are your physical security devices attached to the same network as your sensitive business data?
- By Vince Ricco
- May 01, 2015
NERC compliance requirements in the utilities industry have made it essential to monitor and report on physical access to various facilities, control rooms, substations and critical assets.
- By Jasvir Gill
- May 01, 2015
Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.
- By Ralph C. Jensen
- May 01, 2015