Airbus has disclosed the company is the victim of a cyberattack.
- By Sydny Shepard
- Feb 04, 2019
A proposed ban in San Francisco has introduced a series of rules that could dramatically limit enhanced surveillance.
- By Sydny Shepard
- Feb 04, 2019
Problems at a downtown apartment building leads to discussions on hiring retired officers to keep the peace.
- By Sydny Shepard
- Feb 04, 2019
The way that smart cards are issued has changed dramatically in the last several years with the advent of cloud-based systems that enable the entire process to be managed and executed remotely, and with printer/encoder breakthroughs that significantly boost throughput, reliability and energy efficiency.
- By Robin Tandon
- Feb 01, 2019
Microwave sensors, also known as Radar, RF or Doppler sensors, detect walking, running or crawling human targets in outdoor environments.
- By Courtney Dillon Pedersen
- Feb 01, 2019
The government commands a lot of information in data centers, local municipalities, homeland security, health, and every touch that governments have with private citizens and companies. The data can be classified, private and public-facing as in forms.
- By Carrie Goetz
- Feb 01, 2019
The Internet of Things (IoT) promises greater connectivity, which, when properly leveraged, can provide invaluable insight into our organizations and our operational environments. In the security sector, increased connectivity between sensors and systems gives us access to more data than we thought possible even just a few years ago.
- By Jimmy Palatsoukas
- Feb 01, 2019
As with any high-profile entertainment complex that draws more than one million visitors every year, the stadium faces complex and constantly evolving security challenges.
- By John Burke
- Feb 01, 2019
There’s enormous opportunity for all enterprises in the cloud, and those in the middle market are taking note.
- By Andreas Pettersson
- Feb 01, 2019
Originally designed as consumer devices, smartphones have become vital elements of both our personal and professional lives. Unfortunately, as sources and repositories of our most sensitive data, smartphones have quickly become a primary attack surface for hackers, cybercriminals and foreign spies.