As unregulated virtual currencies make their way back into iOS devices, what type of security issues will develop?
- By Ginger Hill
- Jun 16, 2014
GovSec – the Government Security Conference and Expo, which featured TREXPO, the Law Enforcement Expo, and was held in conjunction with CPM East – saw its conference grow by 20 percent and total attendance reach more than 3,600 in 2014.
Goal is to bring combined strengths of both companies to the development and delivery of the brand.
KeyWatcher Systems ensure accountability for keys and essential communication devices.
New combination will create formidable player in market by combining the strengths of Canon’s imaging technology with Milestone’s video management software.
Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.
- By Ginger Hill
- Jun 12, 2014
4 elements that must be included in a security strategy to gather information from a variety of sources to create heightened security within an organization.
- By Brian McIlravey
- Jun 11, 2014
How three security professionals in the education vertical are keeping their campuses safe and secure for all.
- By Ginger Hill
- Jun 11, 2014
Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
- By Ginger Hill
- Jun 11, 2014
ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.
- By Kim Humborstad
- Jun 10, 2014