Let’s just say the timing was not ideal. GC&E Systems Group had just hired a key executive to spearhead business development and growth within Florida. But Mother Nature had different ideas. Hurricane Irma had just ravaged the entire state of Florida and the company was eager to onboard its newest management team member.
- By Ralph C. Jensen
- Jan 01, 2018
The global access control market is forecast to be worth nearly $10 billion by 2022, with annual growth nearing 7.5 percent over the next six years, according to a recent report by Markets and Markets Research firm.
- By Karen Evans
- Jan 01, 2018
The New Hampshire Liquor Commission (NHLC) experienced a record-breaking fiscal year in 2016. With the increase of business, and the addition of three more state-run stores, the state commission felt it was time to improve on security solutions. Enter Griffon Security Technologies.
- By Ralph C. Jensen
- Jan 01, 2018
The concept of “securing security” emerged when physical security was being affected by cybersecurity attacks.
- By Lance Holloway
- Jan 01, 2018
A few years ago – three to be exact – I became the legal guardian of a granddaughter, and with that came the finding of a daycare that not only provided a good learning environment, but a haven of safety and security.
- By Ralph C. Jensen
- Jan 01, 2018
In the wake of multiple terror attacks and mass shootings this year, some of the biggest New Year’s Eve celebrations in the United States are increasing their security.
- By Jessica Davis
- Dec 29, 2017
In 2018 we can expect to see continued creativity from nation-state actors, a growing focus on industrial control systems, and efforts to compromise the software supply chain.
- By Toni Gidwani
- Dec 28, 2017
The solution is in hand, literally. It’s the mobile phone.
- By Dr. Sarbari Gupta
- Dec 27, 2017
- By Dmitri Alperovitch
- Dec 26, 2017
This holiday season, however, after a year of nasty data breaches, it feels appropriate to take Dr. Seuss’ How the Grinch Stole Christmas[2] and analyze it with some of the basic questions we ask during a data breach.
- By Tyler Reguly
- Dec 22, 2017