Cybersecurity is more than just a headline associated with attacks on critical infrastructure assets, such as utility companies or our nation’s repository of its personnel records of employees with the highest security clearances.
Where there is darkness, light. Or, at least, actionable security video boasting higher quality images at night. George Carlin, as the hippy dippy weatherman, had his spot-on prediction: “Weather forecast for tonight: dark. Continued dark overnight.” Add an additional nighttime forecast of likely chance of greater crime risk, too.
California Assemblyman Mike Gatto and Sen. Ted Gaines announced a bill that would allow first responders to jam, hack or otherwise take down drones "in the course of firefighting, air ambulance, or search-and-rescue operations."
4K ultra-high definition (UHD) technology increases situational awareness and offers considerable value in control room environments. Delivering ~8.3 million pixels, 4K/UHD displays significantly enhance the ability of operators to monitor finely detailed imagery in a range of applications.
AVAILABLE ON DEMAND This webinar examines how Brown Shoe Company uses security technology in its more than 1,300 locations. Join Protection 1’s Lisa Ciappetta, Senior Director Marketing, and Jim Shepherd, National Account Manager, together with their customer, Kevin Darnell, Director of Loss Prevention at Brown Shoe Company, for this webinar!
On Demand Migrating from an analog to an IP camera system has traditionally been a difficult, time-consuming endeavor. Recent innovations make this an easy, risk free process. This webinar will introduce you to technology that can save you up to 70% in expenses and speed up migration.
ON DEMAND | The number one challenge, and often the number one oversight, is infrastructure requirements to support your IP Migration. Attendees will learn to design a IP platform that is easy to manage, switch technology advancements and avoid the gotcha.
Change-makers, thought leaders and industry pioneers, these 16 security executives, legislators and mavericks are making a difference in security, impacting enterprises, communities and nations. Can Hackers Really Control Airplanes? Discover 3 steps for timely cyber intrusion detection. Read all this and more in the September 2015 issue of Security.