While blue lights were previously designed to make people feel safer, the reality is that smartphones are taking safety to the next level by providing better and quicker access to emergency support.
- By Christopher Britton
- Jan 28, 2014
Communities that measure, watch and continue to learn are more aware during times of crisis, so reasonable security efforts should include anti-virus and email security that is used effectively.
- By Kim Singletary
- Jan 21, 2014
How video analytics can play a big role in airport security and operations.
- By Anthony Incorvati
- Jan 07, 2014
Commercial Virtual Private Networks (VPNs) are playing an increasing role in the current battle between privacy-conscious web users and government agencies seeking to increase their surveillance reach. But as online privacy becomes yet another product, ready to be branded and packaged, the problem of dishonest vendors, and a lack of education amongst customers, threatens to undermine any real benefit the market can bring.
- By Nick Pearson
- Dec 17, 2013
Consolidating systems to improve efficiency and meet compliance.
- By Kim Rahfaldt
- Dec 10, 2013
Perhaps the biggest threat to small businesses is uncertainty, but don't forget credit card processing and PCI-DSS compliance.
- By Kim Singletary
- Dec 02, 2013
Investing in proper infrastructure and taking the time to understand how to use analytics empowers retailers.
- By Shahar Ze’evi
- Nov 18, 2013
Internal theft is a top contributor to retail shrinkage.
- By Steve Spatig
- Nov 12, 2013
The capabilities of IP video surveillance make them a popular and effective security tool.
- By Gadi Piran
- Nov 04, 2013
Mobility and efficiency makes remote monitoring an attractive option to maximize productivity.
- By Dave Poulin
- Oct 28, 2013
As recent events in Kenya have shown, both fire and terrorist attacks are potent threats to be assessed and comprehensively guarded against. With regular rehearsals, it can be ensured that response teams can adequately deal with any emergency.
- By Jane Embury
- Oct 18, 2013
Businesses that accept and embrace mobile communications and information will have a sustainable business advantage in the future.
With sensitive documents spread across tablets, laptops, smartphones and other devices, how do businesses keep this data safe?
How is the security team to see and understand what it going on in the cloud when it’s, well…cloudy?
- By Gretchen Marx
- Sep 19, 2013
IP technology taking visibility and image quality to the next level.
- By Dave Poulin
- Sep 11, 2013
The key to data loss prevention is to always backup your data, but there are other ways to help prevent data loss in laptop computers.
- By John Riddell
- Sep 03, 2013
A historical look on some tragic milestones that have shaped modern U.S. fire and building regulations.
- By Jane Embury
- Aug 27, 2013
Organizations worldwide face a dangerous shortage of cyber warriors who possess the skills required to defend against cyber terrorism. A pragmatic and sustainable new approach is urgently needed to prepare cyber warriors to defend critical infrastructures.
The Summerland tragedy changed building regulations across the country because poor design and inappropriate building materials allowed a minor fire to become a major conflagration. The lessons learned had influence across many international jurisdictions.
- By Jimmy Chiu
- Aug 07, 2013
Discover the three major initiatives you need to be aware of when it comes to cards and credentials.
- By Jeremy Earles
- Jul 16, 2013