After spending close to 20 years in the security industry, it is always a good exercise to see what projections came through the last year and which ones we foresee in the coming years. 
                    
			            - By Fredrik  Nilsson
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Since North American Video (NAV) was founded in 1995, the systems integrator has continued to build an outstanding reputation in the physical security market. 
                    
			            - By Ralph  C. Jensen
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In the dealer/integrator business, recurring monthly revenue (RMR) is like finding a gold mine with several profitable veins that can be mined. RMR is an attractive means for a secondary revenue stream.
                    
			            - By Ralph  C. Jensen
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    No one will argue that the network has been one of the greatest evolutions in time. Think of it, everything that you used to do by hand, you can now do via computer. Well, almost everything.
                    
			            - By Ralph  C. Jensen
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    In the professional security market, the model for revenue is changing. Systems integrators are looking for revenue beyond basic sales and maintenance—especially customer-oriented addons to generate recurring monthly revenues (RMR).
                    
			            - By Bud  Broomhead
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Thanks to wireless lock technologies, cloud-based software, and smartphone/tablet integration, it is now possible to deploy a secure, manageable, and cost-effective security solution without the need for complicated and expensive infrastructure.
                    
			            - By Peter  Boriskin
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.
                    
			            - By Jeff  Whitney
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Before installing a networked, open-platform, VMS solution, the Port of Antwerp had a standalone DVR system with no networking capabilities and no open platform support, meaning only a limited number of camera brands were supported.
                    
			            - By Courtney Dillon Pedersen
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    When it comes to access control, it all boils down to companies trying to determine whether you are who you say you are, and whether you are authorized to access certain information. As we all know, both those are tall orders to fill.
                    
			            - By Jeff  Capone
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Radar may not be the first technology that comes to mind when discussing perimeter protection, but that is all beginning to change. 
                    
			            - By Gadi  Bar-Ner
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    My, how times are changing the way we do business… in the publishing industry. Without going back to the details of yesteryear, the manner in which a publication is produced has changed from cut and paste, to the digital version of today.
                    
			            - By Ralph  C. Jensen
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    We live in a world where computer hacking, data breaches, identity theft, and stolen records of all sizes have become worldwide events that can happen at any time.
                    
			            - By Ruben  Lugo
 - Dec 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The coffee chain says hackers might have accessed customer info through a data breach.
                    
			            - By Sydny  Shepard
 - Nov 30, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats 
                    
			            - By Liviu  Arsene
 - Nov 30, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The cameras are expected to cost about $30,000 and will be installed in about three months.
                    
			            - By Sydny  Shepard
 - Nov 30, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
            
                
	                
                    
                                        
		            
                    “The OVMC-EORH employees and medical staff have been very adaptive and supportive, and we are able to continue with quality patient care,” Ohio Valley Medical Center CEO Daniel Dunmyer said. 
                    
			            - By Jessica  Davis
 - Nov 29, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Huawei, the world’s biggest producer of telecoms equipment, has faced pushback from governments due to concerns that its technology could be used for unsavory purposes such as spying. 
                    
			            - By Jessica  Davis
 - Nov 29, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Here are five principles that developers should keep in mind to create more secure apps
                    
			            - By Madhan  Kanagavel
 - Nov 29, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
            
                
	                
                    
                                        
		            
                    Tips and tactics for ensuring your small business is safe from the threat of cyberattacks.
                    
			            - By Michael  Flavin
 - Nov 28, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A security hole in a mail preview program may have made the data of 60 million customers vulnerable.
                    
			            - By Sydny  Shepard
 - Nov 28, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The site of Berlin's devastating 2016 truck attach has now become a testing area for heavy security.
                    
			            - By Sydny  Shepard
 - Nov 28, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
            
                
	                
                    
                                        
		            
                    When a rider uses the app or a text to report a non-emergency security incident, the operations center alerts security staff so they can find the corresponding train and respond to the report. 
                    
			            - By Jessica  Davis
 - Nov 27, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    “By tying in cloud-based or network-based cameras into JSO’s larger infrastructure, it will help them investigate crimes, it will help them with a number of different capacities as it relates to where to put patrols,” Hughes said. 
                    
			            - By Jessica  Davis
 - Nov 26, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The physical security equipment market will see an increase in the next few years, largely due to threats and terrorism around the world.
                    
			            - By Sydny  Shepard
 - Nov 26, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    According to the survey, three of every four respondents admitted that they reuse passwords across accounts, an increase from the 56 percent of respondents who admitted the same in the survey’s 2014 edition.
                    
			            - By Jessica  Davis
 - Nov 26, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Internet connected devices might be the hot item for Christmas this year, but are they secure?
                    
			            - By Sydny  Shepard
 - Nov 23, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Recommendations for safe online holiday shopping - a cybersecurity perspective.
                    
			            - By Sydny  Shepard
 - Nov 23, 2018