Open source technology can help military and other government entities modify software quickly without sacrificing data security. That flexibility, coupled with lower overall cost, is helping fuel a rapid increase in government adoption of open source software, advocates say.
The third Security 5/2K Mission 500 Charity Run in Las Vegas at ISC West raised more than $95,000 to benefit Mission 500, a charitable organization engaging security professionals to sponsor children in need through the World Vision organization.
Milestone Systems IP VMS ís proving the advantages of the open platform approach for Western Kentucky University’s diverse surveillance needs with the ability to expand and customize the system for growing requirements over the years.
A dirty bomb attack centered on downtown Los Angeles’ financial district could severely impact the region’s economy to the tune of nearly $16 billion, fueled primarily by psychological effects that could persist for a decade.
With new security technology operating in its 68 stores, Myer, Australia’s largest department store group, has shown shoplifters that their game is up.
Identifying people by acquiring pictures of their eyes is becoming easier, according to a new report from the National Institute of Standards and Technology (NIST).
The Whitley County School District in southeastern Kentucky recently installed some of the latest surveillance technology on all its buildings.
- By Clint Henderson
- Apr 23, 2012
Developed by a Technical Committee comprised of more than 200 members from 24 countries, this standard establishes a mechanism for Private Security Companies and their clients to provide demonstrable commitment, conformance, and accountability to the principles outlined in the International Code of Conduct (ICoC) for Private Security Service Providers.
For sunbirds and residents of Arizona, Florida and other warm-weather environs, baseball's spring training is a special treat. It's a time to catch an intimate pre-season game and view a team's favorite and newest players, in a casual, up-close and personal environment.
This quarter saw a significant shift in the way the security industry approaches targeted attacks and advanced persistent threats, which are now viewed more as a long-term, ongoing campaign versus the typical "smash-and-grab incidents" favored by cybercriminals in the past, according to the Trend Micro Q1 2012 Security Roundup Report.