Protecting networked information means that biometrics can be embedded in thumb drives.For the City of London Police, information leakage isn’t just business critical, it is a matter of life
Security officers and supervisors were the primary purpose of Ron Minion, who established the International Foundation for Protection Officers. There are just a few people that make a great impact
Mail/Internet Order FraudThe mail and the Internet are major routes for fraud against merchants who sell and ship products, as well as Internet merchants who provide online services. The industry
A number of security executives routinely interact with top CEOs and top enterprise chief security officers as a way to conduct their business and bridge the gap. Three are
Where I live, just a couple of blocks from Wrigley Field, the big conflict is naming rights for the Cubs Park. The current owner, the Tribune Company, has placed
The two most talked about trends – physical security information management (PSIM) and video analytics – are the hot hand in U.S. and international gaming organizations. According to Security Magazine
Four security market leaders gazed into their crystal balls and shared their thoughts on “Technology Trends in the 21st Century” at the 12th annual Securing New Ground conference in New
Can mobile thermal camera systems detect suicide bombers entering a train or bus station? TSA is testing a solution but it may be too soon to implement because of error
Government identity management programs took center stage at the Smart Card Alliance just weeks ago. Critical security initiatives have now entered the issuing phase and over the next year will
For those folks fixated on convergence, the hip-hop hype really is nothing new. Years ago, and I go back too many, the buzz word was integration. The latest twist: convergence