Wireless Networks


Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

While cloud services are becoming increasingly popular for business use, cyberattacks on cloud services are also growing. This has prompted a rise in cloud security software.

Cisco Announces Plan to Acquire Sentryo

Cisco Announces Plan to Acquire Sentryo

Cisco recently announced that it plans to acquire Sentryo in order to optimize visibility, segmentation, and operations for Cisco customers.

Japan to Check 200 Million Devices for Cybersecurity Risks

Japan to Check 200 Million Devices for Cybersecurity Risks

As part of the preparations for next year’s summer Olympics in Tokyo, Japan’s National Institute of Information and Communications Technology will check about 200 million internet-connected devices for potential cybersecurity vulnerabilities.

The Next Wave

Originally designed as consumer devices, smartphones have become vital elements of both our personal and professional lives.

Simplicity and Flexibility

Simplicity and Flexibility

Wireless technology in the security space is on the cusp of becoming the new norm. For the past few years we’ve seen the adoption of the technology grow steadily as it continuously improves upon traditional security solutions.

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

Wi-Fi Security Sees Toughest Upgreat in a Decade

Wi-Fi Security Sees Toughest Upgrade in a Decade

\Wi-Fi Alliance is looking to beef up security with an updated protocol

New Uber Security Feature Connects You with 911 in the Event of an Emergency

New Uber Security Feature Connects You with 911 in the Event of an Emergency

Uber is adding security and safety features to its mobile app to help users feel safe while ride-sharing.



Going All Out

Going All Out

When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.

Get Out of Our Space

Get Out of Our Space

Most people, when confronting a drone (Unmanned Air Vehicle/Unmanned Air System) operating in or around their area of responsibility in an unsafe manner, would like to bring it down immediately.

Trump

Trump's National Security Team Wants to Stop Chinese Spying with 5G Network

The President's national security team is looking at options to counter the threat of China spying on U.S. phone calls.

Hawaii

Hawaii's False Alarm Leads to Changes in Emergency Communication Systems

On Saturday, people in Hawaii received an emergency notification warning of an imminent nuclear missile attack.

Vivint Looks to Expand Smart Home Security to Your Neighborhood

Vivint Looks to Expand Smart Home Security to Your Neighborhood

Vivint has introduced a free app called, "Streety" which allows neighbors to share live video feeds from their home security cameras.

3 Plead Guilty in Mirai Botnet-Related Charges

3 Plead Guilty in Mirai Botnet-Related Charges

Three defendants have pleaded guilty to charges involving the Mirai botnet that was used to knock out several major websites last year, according to court documents unsealed on Tuesday.

Survey Reveals Serious IoT Concerns

Survey Reveals Serious IoT Concerns

The survey was based on responses from 603 IT and line-of-business decision-makers involved in enterprise security teams across the US, UK, Germany, France, Australia and New Zealand.

Providing a Network Link

Providing a Network Link

Outdoor wireless bridges are used to provide a network link from one location to another. You may want to network surveillance cameras back to your main office building, or share Internet and network access with another building on your campus.

The Next Big Step

The Next Big Step

Individuals have found that their phones and other smart devices can be used in their own homes to operate locks, and—along with the push for more IoT-enabled devices at work in general—they have come to expect the same level of sophistication and convenience at work.

How Real Time Media Can Solidify Security and Save Money

SPONSORED

How Real Time Media Can Solidify Security and Save Money

Protecting physical spaces and facilities is an ever-present problem. As bad actors continue to seek unlawful entry in innovative ways and unforeseeable disasters like fires continue to exist, alarm systems need to keep pace and leverage new technologies to prevent and mitigate these risks.

How Cellular Technology is Transforming Home Security and Alarm Panels

SPONSORED

How Cellular Technology is Transforming Home Security and Alarm Panels

As traditional phone lines have declined in recent years, many of these new ecosystems are now being directly supported by cellular and IP networks that avoid publicly switched telephone network (PSTN) infrastructure.

Vulnerabilities Revealed in AT&T Modems

Vulnerabilities Revealed in AT&T Modems

Gaping security holes have been discovered in most AT&T U-verse cable modems that would allow remote cyber criminals to access a household’s internet connection as well as any devices connected to it.

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety