The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Secure communications expert Simon Ford, director of NCP engineering, points out that “most corporations realize the vulnerability of PCs and laptops and have implemented various security protocols to prevent
Security Magazine’s January 2010 has two major features that would gain from your Blogged input. Securing the Global Enterprise -- There are common and unique needs for chief security
It could be how the C-suite folks look at their IT operation, but it turns out that many enterprises have over-bought and are under using servers. A new study
In interviews for an upcoming Security Magazine article on hybrid security video (coming in the December 2009 print issue), a couple of somewhat alien terms arose – cloud computing
Retransfer (reverse thermal image transfer) ID card printing is a process, which improves the quality of the card, the longevity of the printer and the consistency of production by
With use of security outdoors growing, there are special tech challenges. From Videotec, the new ULISSE COMPACT positioning unit offers a quick and precise positioning, sturdiness and simplified system
ComWorx is now the brand name of a line that consists of copper to fiber optic Ethernet media converters, un-managed Ethernet switches, and managed Ethernet switches. By expanding the
RS2 Technologies, LLC, provided Zalud’s Blog with an advance copy of its fourth White Paper, “Underutilization of Features in Access Control Systems -- Getting Your Money’s Worth When Specifying
Zalud’s Blog has found good and bad news in reports about the job market next year. For example, starting salaries in the accounting and finance, information technology (IT), and
Exclusive Analysis by Bill Zalud Today’s darling of sometime security industry gurus, integrators and vendors of a certain mindset, Cisco Systems is spending big bucks in a middling economy to