From the numerous security industry expositions to the Jones’ wireless home broadband net, today’s overarching buzz percolates with two words – Internet Protocol. For enterprise security operations, it’s IP security
Web-hosted access control solutions allow end-user security to create user directories, which are housed off-site on server farms. The application includes activity logs and other features. Display courtesy of Brivo
Identity theft shakes whole communities. Pictured is a free community shred to combat identity theft. The event, sponsored by Crime Stoppers, Shred-It and Wal-Mart allowed people to dispose of sensitive
From Saflink, the SureAccess all-weather, smart card, biometric reader meets the strict requirements of FIPS 201’s Personal Identity Verification of federal employees and contractors. It’s based on technology previously deployed
Private industries need to join the fight against terrorist ideologies, says Financial Integrity Network Chairman Juan Zarate. Read how in the July edition of Security magazine. This issue also includes guidance about CSO compensation and salary, banking security, emergency notifications and more.