In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.
                    
			            - By Matt  Holden
 - Feb 09, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    By 2019, it is predicted that more than half a billion wearable devices will be in use each day. 
                    
			            - By Ginger  Hill
 - Feb 04, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    One tech expert says biometrics are good, but there are still problems to consider.
                    
			            - By Matt  Holden
 - Jan 29, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Agreement opens floodgates for international expansion. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    One commercial flight was diverted while two were also evacuated 
                    
			            - By Matt  Holden
 - Jan 27, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The late night host was able to get passwords from strangers off the street in a skit on his show.
                    
			            - By Matt  Holden
 - Jan 20, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In 2014, the number of Internet users worldwide has reached nearly 30 billion. While the majority of these users connect via fixed-line to a PC, the growth of mobile- and cloud-based solutions has skyrocketed.
                    
			            - By Christie  Walters-Hebert
 - Jan 01, 2015
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    As the time nears on the shutdown of the second-generation, or 2G, wireless network, now is the time for security dealers and integrators to not only start planning for this massive migration but also begin searching for opportunities to make this change easier for themselves as well as their clients.
                    
			            - By Ginger  Hill
 - Jan 01, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The BlackBerry Enterprise Server (BES 12) will be integrated into the phone.
                    
			            - By Matt  Holden
 - Dec 22, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    According to eMarketer, the United States will pass 50% Smartphone penetration among its population. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    These tips will help secure pay data when shopping online
                    
			            - By Matt  Holden
 - Dec 16, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A new report indicates consumers remain concerned about medical technology and the security of their health information and data.
                    
			            - By Matt  Holden
 - Dec 04, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Stealthy youngster uses ninja-like skills to gain access to his father's iPhone6.
                    
			            - By Ginger  Hill
 - Dec 03, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Wirelurker sneaks onto computers using unauthorized Chinese apps.
                    
			            - By Ginger  Hill
 - Nov 06, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New indoor positioning systems enhance ability for security teams to detect shooters earlier and locate people inside buildings. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Central station-based Smartphone apps that provide anywhere, anytime life protection services and new revenue stream for partners.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Steep fines are being issued and some are having their votes invalidated.
                    
			            - By Ginger  Hill
 - Nov 04, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    As the desire to connect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security.
                    
			            - By Steve   Spatig 
 - Nov 03, 2014
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The ruling doesn’t allow police to unlock phones using passcodes, however.
                    
			            - By Matt  Holden
 - Nov 03, 2014