This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Get to know Taylor Carr, Vice-President, Business Development & Integration for Securadyne Systems, and learn how Securadyne’s enterprise security executive customers are addressing cybersecurity in their enterprises.
May 1, 2014
Virtually all of the new video solutions we have deployed over the past few years have been IP-based. However, we still have many customers with existing large analog systems, and they need to operate, expand and optimize those systems today.
A new Ponemon Institute survey suggests key cybersecurity deficits, disconnects and low attack visibility in many enterprises.
April 30, 2014
The survey of nearly 5,000 global IT security professionals reveals a deficit in enterprise security systems, a disconnect in how confidential data is valued and limited visibility into cybercriminal activity. The report gives new insight into why cybercriminals have a foothold in the broader enterprise.
The Pentagon plans to more than triple its cybersecurity staff in the next few years to defend against Internet attacks that threaten national security.
Half of all cyberattacks are aimed at businesses with fewer than 2,500 employees, according to a new guide by California Attorney General Kamala Harris.
IT security risks continue to become more challenging, not just because of the new technologies of systems and applications, but also because of the size and stature of criminal organizations involved in malicious cyber activity.
The health sector, in partnership with the federal government, will conduct simulated attacks against health care networksto test their vulnerability to hackers.