Online Exclusives


Back-to-School Basics

Back-to-School Basics

Three key components to ensure a safe and secure campus by dissecting the core fundamental DETER.

Q and A with Chief Information Security Officer at Duke University about Yubico

Q and A with Chief Information Security Officer at Duke University about Yubico

Richard Biever talks strong authentication, two-factor authentication, YubiKey, user feedback and working with Yubico.

There

There's more to School Safety than Active Shooter Training

Enhanced Non-Lethal (ENL) devices can play a vital role in managing more common types of violence on campus.

Securing Your Bank

Securing Your Bank's Email with 4-Layer Protection

Sending a wrong email can lead to massive privacy breaches which could inflict penalties or fines, or even loss of revenue.

Ensuring Fleet Operations Don

Ensuring Fleet Operations Don't Become a Runaway Vehicle

Acquire data to recognize where the issues are and then create a system to train employees to avoid risk.

Application Single Sign-on – Benefits and Considerations

Application Single Sign-on – Benefits and Considerations

Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.

Two Nations, One Big Opportunity

Two Nations, One Big Opportunity

A look at public space surveillance on either side of the Atlantic highlights how it came of age.

Protect Critical Infrastructure With Advanced Identity Management Solutions

Protect Critical Infrastructure With Advanced Identity Management Solutions

Huge component in protecting critical infrastructure from being high-risk terrorist targets is by properly managing the identities of those getting into and out of secured zones.

Should You Expect Your Security Software to Predict The Future?

Should You Expect Your Security Software to Predict The Future?

6 steps on predicting the future of your network's security: process, enhance, cross-correlate, baseline and analyze information.

Preventing Consumer Data Breaches with Electronic Access Control

Preventing Consumer Data Breaches with Electronic Access Control

As retail continues to expand the scope of its security administration to prepare for security breaches, IT managers must extend down to the rack level.

Internet of Things - More Like Internet of Threats

Internet of Things - More Like Internet of Threats

In theory, IoT is a great concept; it all boils down to ease of use vs security. Which is more important?

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Crime doesn't discriminate against size; small businesses are typically most vulnerable with fewer resources to guard against it.

The Biometric Card - Next Evolution for ID Cards

The Biometric Card - Next Evolution for ID Cards

ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.

The Token-less Solution to Eradicating Passwords

The Token-less Solution to Eradicating Passwords

In a world where security measures are always changing, but to date, have failed to keep our identities safe, what is the best way to keep our personal material truly secure?

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

IT Experts Weigh in on the Four Steps to Choosing a Cloud Services Vendor

Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.

What Everyone Should Know about Privacy, Security and Confidentiality

What Everyone Should Know about Privacy, Security and Confidentiality

Understanding the difference and likenesses between data privacy, information security and confidentiality provides a rich tool set to protect information as long as the proper protection paradigm is applied.

Physically Securing Medical Equipment with Electronic Access Control

Physically Securing Medical Equipment with Electronic Access Control

Solution should provide remote monitoring capabilities to control access within a facility and audit trail capabilities to demonstrate compliance with HIPAA requirements.

Bringing More Value to Business Solutions with Access Control

Bringing More Value to Business Solutions with Access Control

A well-designed, solidly-engineered access control system is fundamental to any security strategy, especially if it is backward compatible with an open architecture.

Biometrics at the ATM: You Can Bank On It

Biometrics at the ATM: You Can Bank On It

Banks worldwide are putting biometrics at the front end using fingerprint authentication.

Eileen Turner serves as the Product Manager for the web fraud portfolio of Trusteer, an IBM Company, part of IBM’s Security Systems division.

When Online Fraud Targets You

When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3