Bridging the gap between electronic access control and key vulnerabilities. 
                    
			            - By Danny   Garrido
 - Feb 23, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    With an underground bunker, LAPD officers, FBI, Department of Homeland Security and snipers, yearly award ceremony went off without a hitch. 
                    
			            - By Ginger  Hill
 - Feb 23, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A video posted online called for attacks against the mall.
                    
			            - By Matt  Holden
 - Feb 23, 2015
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Intelligence agencies can intercept and decrypt communications without informing wireless network providers, foreign governments or the individual user. 
                    
			            - By Ginger  Hill
 - Feb 20, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    More than 50 Sony security cameras provided situational awareness, threat assessment and personnel management.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Company interfaced it's IP cameras with the Lenel Network Video Recorder (NVR) 7.1. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    AICC launches industry-wide research project.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    If cyber crime and identity theft isn't taken into consideration.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Available for download from System Sensor and includes detailed application guidelines, codes/standards and more.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The search phrase was giving people advice for joining the radical group.
                    
			            - By Matt  Holden
 - Feb 20, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Thousands discovered with the majority of them loaded.
                    
			            - By Ginger  Hill
 - Feb 19, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Showcasing upcoming release of Security Center, new SIP-based Communications Module and Hybrid Cloud Archiving Service.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Firm provides security and access control to customers in Northern Florida.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The government is also looking to prevent young people from becoming radicalized.
                    
			            - By Matt  Holden
 - Feb 19, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Innovative Razberi ServerSwitch manufacturer triples their office, production and storage space.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.
                    
			            - By Matt  Holden
 - Feb 18, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Drone strikes integral part of global warfare.
                    
			            - By Ginger  Hill
 - Feb 18, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Cloud-based service loads applications into the cryptographically-secured Trusted Execution Environment, embedded in the majority of leading Android smartphones.