Businesses that accept and embrace mobile communications and information will have a sustainable business advantage in the future.
With sensitive documents spread across tablets, laptops, smartphones and other devices, how do businesses keep this data safe?
How is the security team to see and understand what it going on in the cloud when it’s, well…cloudy?
- By Gretchen Marx
- Sep 19, 2013
IP technology taking visibility and image quality to the next level.
- By Dave Poulin
- Sep 11, 2013
The key to data loss prevention is to always backup your data, but there are other ways to help prevent data loss in laptop computers.
- By John Riddell
- Sep 03, 2013
A historical look on some tragic milestones that have shaped modern U.S. fire and building regulations.
- By Jane Embury
- Aug 27, 2013
Organizations worldwide face a dangerous shortage of cyber warriors who possess the skills required to defend against cyber terrorism. A pragmatic and sustainable new approach is urgently needed to prepare cyber warriors to defend critical infrastructures.
The Summerland tragedy changed building regulations across the country because poor design and inappropriate building materials allowed a minor fire to become a major conflagration. The lessons learned had influence across many international jurisdictions.
- By Jimmy Chiu
- Aug 07, 2013
Discover the three major initiatives you need to be aware of when it comes to cards and credentials.
- By Jeremy Earles
- Jul 16, 2013
Enterprises see a growth in employee demand for mobile device use in the workplace (a trend known as “Bring Your Own Device” – or BYOD), both to enhance individual productivity and generate business value.
- By Nataraj (Raj) Nagaratnam
- Jun 21, 2013
As the war over mobile-device market share wages on–especially with the launch of several new phones and tablets into the market–we can expect a continued rise of security issues in the workplace.
- By Jeff Pederson
- Jun 14, 2013
Thermal imagers allow you to “detect” a target by amplifying the heat signature of something or someone, where night vision amplifies ambient light by millions of times so that you can “identify” a target in minimal light.
- By Spiro Demetriadi
- May 31, 2013
Mobile banking has evolved over time and, if you ask most consumers, it’s something they’ve come to trust and rely on as usage numbers continue to rise. In this article, Stephen Joseph explores the five most common myths of IP solutions in the banking environment.
- By Stephen Joseph
- Apr 30, 2013
With many banks and financial institutions worldwide concentrating on the increasing cyber threat, it is imperative that the physical aspect of the security within our banks and financial institutions are not left by the wayside.
Wrightstyle is a specialist in designing, fabricating and installing steel and glass systems for both internal and external applications. The company’s systems have been installed in commercial and public sector projects internationally. Director Jane Embury reports on several needless nightclub tragedies and on lessons learned.
- By Jane Embury
- Apr 09, 2013
With over 500,000 apps in the Apple App Store, what security professional has time to wade through that list? I have compiled a list of the top 10 security-related, must-have apps.
- By Ginger Hill
- Apr 04, 2013
On bus, rail and paratransit vehicles, light sensitive cameras, digital video recorders and management software programs are being installed to monitor what operators cannot directly observe while driving a bus or operating these vehicles.
- By Rodell Notbohm
- Apr 01, 2013
Wrightstyle is a leading steel glazing company that has supplied systems for transportation projects internationally. In the USA and Canada, the company works in partnership with Hope’s Windows, Inc. (Jamestown NY). Wrightstyle’s technical director Lee Coates reports.
- By Lee Coates
- Mar 25, 2013
With growing requirements for real-time video, graphics and data feeds visually assembled onto a large shared display system, the security control room enables staff to monitor multiple streams of information simultaneously and thus make faster and more accurate mission-critical decisions.
- By John Stark
- Mar 08, 2013
Border checkpoints can’t afford to cut technologies or staff to reduce their footprint because doing so could allow dangerous materials, contraband or even outright threats to enter the country unchecked.
- By Andrew Goldsmith
- Mar 04, 2013