Four security market leaders gazed into their crystal balls and shared their thoughts on “Technology Trends in the 21st Century” at the 12th annual Securing New Ground conference in New
The above diagram describes one view of a wireless mesh network topology, where the end point devices are typically sensors, in this example, one-way devices (anything from security devices such
Wireless communications supports the security and life safety needs of government vehicles at two Northern California cities.Who would have guessed it? In the face of tight budgets, slow tech starts,
Can mobile thermal camera systems detect suicide bombers entering a train or bus station? TSA is testing a solution but it may be too soon to implement because of error
Wildfires in Southern California threatened numerous corporate headquarters and the homes of their employees. A key security effort: a pre-tested disaster plan and diverse means of communicating with employees and
When considering contract security officers, there are reasonable steps to take before signing on the dotted line.With an estimated 1.2 million private security officers employed in the United States, and
Government identity management programs took center stage at the Smart Card Alliance just weeks ago. Critical security initiatives have now entered the issuing phase and over the next year will
The Port of Halifax will use vascular biometrics to identify and authenticate employees.So what do St. Anthony's and the Port of Halifax have in common? It's the need to monitor
The emerging unified communications environment (including instant messaging, VoIP phones and TelePresence gear) create challenges for security and IT executives. Chart courtesy of Dimension DataYearning for the good old days?
For those folks fixated on convergence, the hip-hop hype really is nothing new. Years ago, and I go back too many, the buzz word was integration. The latest twist: convergence