At the center of any government organization’s security operation stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or Security Operations Center (SOC).
- By Dan Gundry
- Oct 01, 2018
The TSA is implementing some pretty amazing technology in order to improve explosives detection. In late August, the agency unveiled a state-of-theart advanced technology computed tomography (CT) checkpoint scanner for screening passengers and their baggage.
- By Ralph C. Jensen
- Oct 01, 2018
Wireless technology in the security space is on the cusp of becoming the new norm. For the past few years we’ve seen the adoption of the technology grow steadily as it continuously improves upon traditional security solutions.
- By Peter Boriskin
- Oct 01, 2018
Good business is about partnerships. Our cover story in this issue comes from Jeff Huggins who has written about different examples of not only keeping people secure, but also offering protection.
- By Ralph C. Jensen
- Oct 01, 2018
The hack dates back to April 2018, and compromised information includes email addresses and passwords.
- By Jordan Lutke
- Sep 28, 2018
“Firefox Monitor” will allow users to check whether their personal information and passwords have been part of a data breach
- By Jordan Lutke
- Sep 28, 2018
The terminal will be deployed at Hartsfield-Jackson Atlanta International Airport, and will allow travelers to use facial recognition instead of their passports to pass through checkpoints at the airport.
- By Jordan Lutke
- Sep 28, 2018
Another busy day of GSX 2018 is in the books and with it came excited conversations, innovate products and streamlined solutions. With each booth I visited, I was excited by the new solutions and the potential deployments in the security space.
- By Sydny Shepard
- Sep 27, 2018
So, it all comes down to this. Today is the final day of the new GSX 2018, and the final tally should show a mixed review.
- By Ralph C. Jensen
- Sep 27, 2018
MacOS Mojave shipped with a bug that allows unauthorized access to a user’s private data.
- By Jordan Lutke
- Sep 27, 2018