From the numerous security industry expositions to the Jones’ wireless home broadband net, today’s overarching buzz percolates with two words – Internet Protocol. For enterprise security operations, it’s IP security
Web-hosted access control solutions allow end-user security to create user directories, which are housed off-site on server farms. The application includes activity logs and other features. Display courtesy of Brivo
Identity theft shakes whole communities. Pictured is a free community shred to combat identity theft. The event, sponsored by Crime Stoppers, Shred-It and Wal-Mart allowed people to dispose of sensitive
From Saflink, the SureAccess all-weather, smart card, biometric reader meets the strict requirements of FIPS 201’s Personal Identity Verification of federal employees and contractors. It’s based on technology previously deployed
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!