Goal is to bring combined strengths of both companies to the development and delivery of the brand.
KeyWatcher Systems ensure accountability for keys and essential communication devices.
New combination will create formidable player in market by combining the strengths of Canon’s imaging technology with Milestone’s video management software.
Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.
- By Ginger Hill
- Jun 12, 2014
4 elements that must be included in a security strategy to gather information from a variety of sources to create heightened security within an organization.
- By Brian McIlravey
- Jun 11, 2014
How three security professionals in the education vertical are keeping their campuses safe and secure for all.
- By Ginger Hill
- Jun 11, 2014
Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.
- By Ginger Hill
- Jun 11, 2014
ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.
- By Kim Humborstad
- Jun 10, 2014
Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?
- By Ginger Hill
- Jun 10, 2014
GSM radio sewn into sweatshirt allows different gestures to trigger different text messages to be sent to smartphone contact.
- By Ginger Hill
- Jun 09, 2014