Top Stories


Seven Indispensable Cybersecurity Tips

Seven Indispensable Cybersecurity Tips

Cybersecurity is something everyone should be concerned about. Every business must work to protect sensitive data and personal privacy. Here are seven indispensable cybersecurity tips for any and everyone on the internet.

Bigger is Getting Better

Bigger is Getting Better

Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security.

Consider Data Security

Consider Data Security

Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.



Cyber and Security

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.

Opening New Opportunities

Opening New Opportunities

As demand for controlled access communities continues to grow, so does the demand for secure and flexible access solutions.

Transitioning from Video to Vision

In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.

Growing Adoption

One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages

Cash In Transit

By definition, cash-in-transit (CIT) is the physical transfer of banknotes, coins, credit cards and items of value from one location to another.

Does your office security system have the power of foresight?

Does Your Office Security System Have the Power of Foresight?

If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.

Crossing the Border at Your Peril

There is little question that the Southern U.S. border is porous; people stream into the United States at will. There is a great need for security; and the best technology should be used.

How to Protect Your Business from Amazon

How to Protect Your Business from Amazon

If you think your dealership isn’t conducive to outside pressures, ask the merchants of Smalltown, USA, about that new Walmart going up on the outskirts of the municipality.

Your Top Data-Exposure Risk: Employees

People are fallible creatures. As the saying goes, nobody’s perfect.

Cybersecurity Challenges

Cybersecurity Challenges

Healthcare institutions face a variety of cybersecurity challenges, and the threats continue to grow and evolve. Hospitals are particularly vulnerable to data breaches and ransomware attacks because of the high value of healthcare data

A Browsing Challenge

A Browsing Challenge

Google Chrome is largely considered one of the most security-conscious browsers, but recent headlines revealed some of its weaknesses.

Expanding Rural Infrastructure for Drones

Expanding Rural Infrastructure for Drones

Drones can provide significant benefits for residents and business in rural areas: delivering medical supplies, collecting data on the status of crops, aiding in search and rescue efforts.

Flying Under the Radar

Flying Under the Radar

With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals.

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

The Age of Voice

The Age of Voice

We all are talking to machines these days. We talk to assistants in our home, in our cars and on our phones. By using our voice, we feel more engaged. We also become more productive, freeing our hands and minds for other tasks.

Featured

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.