Top Stories


Facebook Accused of Misusing the Phone Numbers

Facebook Accused of Misusing Phone Numbers

Facebook users have found that a phone number they added to their account for the sole purpose of two-factor authentication can be used to look up their account by advertisers and strangers.

Phillies to Install Security Bollards at Citizens Park Bank

Phillies to Install Security Bollards at Citizens Park Bank

Phillies security director Sal DeAngelis said that two years ago, the team took notice of the way terrorists were using vehicles in their attacks. They realized that they needed to update the park’s security in response.

IBM Finds Security Flaws in Visitor Check-In Systems

IBM Finds Security Flaws in Visitor Check-In Systems

“We found that you could break out of the kiosk and interact with the underlying Windows operating systems, and from there do things like drop malware or open up the database,” said Daniel Crowder, research director at the IBM X-Force Red security unit.



Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

What can you do to protect your personal data in 2019?

Louisiana Prison to Undergo $1 Million Security Upgrade

Louisiana Prison to Undergo $1 Million Security Upgrade

Bossier, La. maximum-security prison to undergo sweeping security upgrades

How to Offer Mobile Convenience While Keeping Health Data Secure

How to Offer Mobile Convenience While Keeping Health Data Secure

The solution isn’t to be afraid of mobile in healthcare

TikTok Hit with Record Setting Fine for Collecting Data of Children

TikTok Hit with Record Setting Fine for Collecting Data of Children

TikTok, a popular video-sharing app, has agreed to pay $5.7 million to settle allegations that it collected data on children.

More Than Just Security

As technology has advanced, security has branched out beyond simple surveillance and intruder deterrence.

Leveraging Thermal Against Threats

Leveraging Thermal Against Threats

Artificial intelligence continues to redefine the capabilities of physical security systems and shape customer demands.

Selecting the Right Access Control System

Selecting the Right Access Control System

With a password on each computer and a cardbased access control system on the door, many businesses feel they have their bases covered when it comes to both logical and physical security.

Six Trends, Predictions and Emerging Technologies Ahead of ISC West 2019

Six Trends, Predictions and Emerging Technologies Ahead of ISC West 2019

The following predictions for ISC West 2019 dive deeper into how these innovations, among others, will help move the security industry forward.

Secure Storage in the Age of Edge Computing and the Cloud

Secure Storage in the Age of Edge Computing and the Cloud

Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.

A Secure Healthcare Prescription

A Secure Healthcare Prescription

Hospitals and other healthcare facilities face unique security and surveillance challenges.

The Uberization of Security’s Business Model

The Uberization of Security’s Business Model

Companies large and small are now actively seeking a fresh approach to optimizing their physical and logical security operations and managing their risk, while capping or reducing their total cost of ownership (TCO).

Automating Critical Environments

Automating Critical Environments

As key stakeholders look to implement AI into their workflow, many find that security and safety is a commonsense place to begin.

Continued Integrity

Continued Integrity

For the County of Travis in Austin, Texas, research, dedication and the right team resulted in the perfect integrated security solution for its sprawling campus and multi-location facilities.

Creating User-Centric Citizen Identity Programs

Creating User-Centric Citizen Identity Programs

Governments are implementing innovative programs that are revolutionizing how the world looks at identity and citizenship.

Looking Beyond the Hype

Looking Beyond the Hype

The past few years have seen significant advancements in computing power. With this, machines seem to have a greater ability to learn about us and participate in our lives.

Protecting Mining and Quarry Operations

Protecting Mining and Quarry Operations

Natural resources being extracted at a mining or quarry operation not only have monetary value, but may also be critical components of medical, military, and industrial processes.

Featured

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3