This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security experts at Unisys Corporation predict that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data traffic inside enterprises is vulnerable to detection from outsiders.
Public disclosures about U.S. government surveillance threaten the ability of police to use powerful new technologies such as drones and mobile license plate readers.
Edward Snowden, the former CIA employee who blew the lid off of the National Security Agency’s secret surveillance programs, has released the U.S. intelligence community’s classified “black budget” for fiscal year 2013.
Senator Patrick Leahy has introduced a bill seeking to rein in the sweeping U.S. government surveillance programs exposed by former National Security Agency contractor Edward Snowden.
University research funded by the Alarm Industry Research and Educational Foundation (AIREF) provides a look into the mind of a burglar by examining the behaviors of convicted offenders in three states.
Like many utility companies around the country, City Utilities in Springfield, Mo., was the victim of copper theft. To protect the substations, security cameras were a must. However, providing the lighting for the cameras posed a problem.
Not exactly Maxwell Smart’s Cone of Silence, there was a time when security staff members monitoring blurry CCTV video images on CRTs would look through a kind of cone device to cut down on monitor glare.
Information storage, according to psycho cybernetics author Paul Thomas, has to take place at the unconscious level. Less psycho– and more cyberfocused, Thomas has – unconsciously, no doubt – managed to get security video storage right, too.