In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications.
A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.
- By Matt Holden
- Feb 09, 2015
By 2019, it is predicted that more than half a billion wearable devices will be in use each day.
- By Ginger Hill
- Feb 04, 2015
One tech expert says biometrics are good, but there are still problems to consider.
- By Matt Holden
- Jan 29, 2015
Agreement opens floodgates for international expansion.
One commercial flight was diverted while two were also evacuated
- By Matt Holden
- Jan 27, 2015
The late night host was able to get passwords from strangers off the street in a skit on his show.
- By Matt Holden
- Jan 20, 2015
In 2014, the number of Internet users worldwide has reached nearly 30 billion. While the majority of these users connect via fixed-line to a PC, the growth of mobile- and cloud-based solutions has skyrocketed.
- By Christie Walters-Hebert
- Jan 01, 2015
As the time nears on the shutdown of the second-generation, or 2G, wireless network, now is the time for security dealers and integrators to not only start planning for this massive migration but also begin searching for opportunities to make this change easier for themselves as well as their clients.
- By Ginger Hill
- Jan 01, 2015
The BlackBerry Enterprise Server (BES 12) will be integrated into the phone.
- By Matt Holden
- Dec 22, 2014
According to eMarketer, the United States will pass 50% Smartphone penetration among its population.
These tips will help secure pay data when shopping online
- By Matt Holden
- Dec 16, 2014
A new report indicates consumers remain concerned about medical technology and the security of their health information and data.
- By Matt Holden
- Dec 04, 2014
Stealthy youngster uses ninja-like skills to gain access to his father's iPhone6.
- By Ginger Hill
- Dec 03, 2014
Wirelurker sneaks onto computers using unauthorized Chinese apps.
- By Ginger Hill
- Nov 06, 2014
New indoor positioning systems enhance ability for security teams to detect shooters earlier and locate people inside buildings.
Central station-based Smartphone apps that provide anywhere, anytime life protection services and new revenue stream for partners.
Steep fines are being issued and some are having their votes invalidated.
- By Ginger Hill
- Nov 04, 2014
As the desire to connect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security.
- By Steve Spatig
- Nov 03, 2014
The ruling doesn’t allow police to unlock phones using passcodes, however.
- By Matt Holden
- Nov 03, 2014