Cloud technologies are giving people access through their mobile phones and other devices to a variety of new experiences, while making their workplaces smarter and more data-driven.
- By Hilding Arrehed
- Oct 01, 2018
With the added video capabilities, Manteno authorities can alert agencies north or south of town to be on the lookout for specific vehicles with good description details.
- By Courtney Dillon Pedersen
- Oct 01, 2018
Northwestern Mutual operated several disparate security systems for access control, alarm management, intercom, video and visitor management. The new building project provided an opportunity to upgrade the security system and overall security program.
- By Kim Rahfaldt
- Oct 01, 2018
By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks.
At the center of any government organization’s security operation stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or Security Operations Center (SOC).
- By Dan Gundry
- Oct 01, 2018
The TSA is implementing some pretty amazing technology in order to improve explosives detection. In late August, the agency unveiled a state-of-theart advanced technology computed tomography (CT) checkpoint scanner for screening passengers and their baggage.
- By Ralph C. Jensen
- Oct 01, 2018
Wireless technology in the security space is on the cusp of becoming the new norm. For the past few years we’ve seen the adoption of the technology grow steadily as it continuously improves upon traditional security solutions.
- By Peter Boriskin
- Oct 01, 2018
Good business is about partnerships. Our cover story in this issue comes from Jeff Huggins who has written about different examples of not only keeping people secure, but also offering protection.
- By Ralph C. Jensen
- Oct 01, 2018
The hack dates back to April 2018, and compromised information includes email addresses and passwords.
- By Jordan Lutke
- Sep 28, 2018
“Firefox Monitor” will allow users to check whether their personal information and passwords have been part of a data breach
- By Jordan Lutke
- Sep 28, 2018