How can you protect your organization and employees with a fully integrated threat monitoring system and help fulfill your duty of care obligations and keep your employees safe?
Mobile computing, cloud applications and tele-work have all combined to erode the traditional corporate security perimeter — and, in doing so, have largely transferred the attack surface to end-user devices.
Houses of worship, security enterprises, retail, healthcare and many more enterprises can benefit from video management systems (VMS). Learn about many VMS solutions available in the market today.
To help meet demands of metal detectors in the entrances of schools, airports, houses of worship and correctional facilities, the National Institute of Standards and Technology has researched and developed four new metal detection testing standards.
As we have done in previous years, the Security magazine team compiled our favorite articles from this year. As we head into 2020, we hope you take a moment to review some of 2019’s top articles about lessons learned, thought leadership, security challenges and good practices.
Our baseline level of suspicion about the security of data and communications is very high these days. Are smart devices recording conversations and conveying them to marketers?
On October 10, 2019, the California Attorney General's office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. What are they, and what should enterprises do to achieve compliance and avoid costly fines?
On October 10, 2019, the California Attorney General’s (AG) office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. The AG’s office also announced that it will hold public hearings on the regulations on December 2-5.
To remedy the cybersecurity skills gap and fight data breaches, enterprises across the world are looking overseas. How can public-private partnerships help resolve the industry-wide issue?