A security report released today by Verizon that studied 855 breach incidents from last year concluded that 97 percent of them could have been avoided by "simple and intermediate controls."
A major trend in the security integration channel has been the evolution of IP security surveillance cameras and Network Video Recorders (NVRs). Instead of using their own dedicated cabling, the devices are sharing the existing IP-based computer network infrastructure. The popularity and affordability of IP networking has driven security integrators to utilize existing Ethernet networks more and more.
Two companies have joined forces to create the world's first instantaneous gunshot detection and facial recognition system, according to an article from Security CCTV News.
A mutli-agency exercise was staged on Wednesday, March 7, 2012, to simulate a cybersecurity attack on the New York City electric supply during a summer heat wave.
Counter terrorism today is an increasingly complex matter. No longer do counter-terror and homeland security efforts just consist of securing our homeland’s borders. We are faced with mounting threats of cyberterrorism and attacks on critical national infrastructure; challenges in protecting our nation and its citizens in times of disaster; along with emerging extremists and threats from radicalization.
The US National Institute of Standards and Technology (NIST) announced plans to break ground on a new center that will be committed to cybersecurity research.
Security researchers said they found a vulnerability in the Google Inc mobile payments platform which is currently available in phones sold by Sprint Nextel Corp.
More than half of Federal employees use at least one mobile device at work, a CDW-G survey found, and many are using personal devices to accomplish work-related tasks.