This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Technology has become ingrained in enterprise security operations.
December 1, 2013
Like most other segments of the business world, technology has become ingrained in enterprise security operations. With that increased use of technology comes a new set of risks.
I used to write stories like this on a typewriter back in the day. My articles turned out to be a mass of White-Outs to counter typing mistakes. It all made me dizzy. Today’s computer technology even auto-corrects my words, which sometimes is not a good thing.
Hungry for the highlights from ASIS 2013? See Security magazine's editors' picks for this year's best in show.
November 5, 2013
The 2013 ASIS International Exhibition in Chicago was abuzz with new and renewed security solutions and technology. Hungry for the highlights? Check out Security magazine’s editors’ picks for some of the best products of the show.
Having smoke and fire detectors without fire suppression technology is like having video surveillance without alarm response.
November 5, 2013
A fire in 2013 that began in the attic of a Colorado sorority house burned for hours before anyone detected it, resulting in a million-dollar loss. Why? The three-story, wood-frame house had no fire detection system, and a sprinkler system covered the living spaces but not the attic.
Public disclosures about U.S. government surveillance threaten the ability of police to use powerful new technologies such as drones and mobile license plate readers.
Two weeks ago, ASIS International Seminar and Exhibits arrived in Chicago, bringing plenty of flash in its opening ceremonies, as well as plenty of possible security solutions on the show floor, as manufacturers seek to help enterprise security leaders get more from their existing investments in analog systems.
As an enterprise security professional managing information and cyber security, your duty is to protect your company’s data and confidential communications from theft or loss.
Evolving threats necessitate increased collaboration among organizations, security providers and first responders – how can enterprise security executives adapt?
What’s trending in access control in security enterprises? Interest in outsourced managed access control solutions, particularly for retail establishments, financial institutions and high-end commercial enterprises, says Nelson Barreto, enterprise sales director for North Canton, Ohio-based Diebold Security.