SANS will be hosting a complimentary webcast on April 12, releasing the results to the First Annual Survey on Mobility Security.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    New findings from a Tenable Network Security study have revealed that mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Scientists recently described development of a new explosives detector that can sense small amounts of TNT and other common explosives in liquids instantly with a sensitivity that rivals bomb-sniffing dogs, the current gold standard in protecting the public from terrorist bombs. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    ASIS International (ASIS) is pleased to announce that Mohamed ElBaradei, former director general, International Atomic Energy Agency (IAEA), will address attendees of the ASIS International 58th Annual Seminar and Exhibits on Tuesday, September 11 at 8 a.m. at the Pennsylvania Convention Center in Philadelphia.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The concept behind fire-adapted communities is that with proper community-wide preparation, populations and infrastructure can withstand the devastating effects of wildland fire.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Surveillance data is critical in applications ranging from retail to government, and gaming to transportation. Today, video usage is moving beyond security and safety to other key business functions such as training, staffing, marketing and traffic flow. The strategic value of video data is made possible because of advancements in IP-based megapixel cameras and the intelligence of incoming video streams, which are increasingly tagged with information to improve search capabilities. But the influx in high-resolution video data combined with the greater amount of VMS features creates a significant performance challenge for video surveillance storage systems, which are the core of any surveillance deployment. Flash memory is a compelling new high-performance storage technology, but the price premium over disk drives is so large that it takes some creative thinking to make flash costeffective for mainstream surveillance environments.
                    
			            - By Lee  Caswell
 - Apr 01, 2012
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Cell towers and accompanying cell sites attract more attention in the area of security than ever before.
                    
			            - By Rolland   Trayte
 - Apr 01, 2012
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Its deputies in the field were being asked to make do with an old, end-of-life mobile data terminal (MDT) system that it had been using for more than two decades.
                    
			            - By TJ  Kennedy
 - Apr 01, 2012
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Integration of multifaceted security systems can be a serious challenge. Using cameras, call boxes, mass notification systems and access control readers together is a difficult but increasingly common goal.
                    
			            - By Samuel  Shanes
 - Apr 01, 2012
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Susceptibility to an attack begins with an unprotected perimeter. In the past, an unprotected perimeter often meant the opportunity for myriad security breaches, loss of assets and the chance for loss of human life.
                    
			            - By Patricia  Logue
 - Apr 01, 2012