This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Technologies

Technologies
Technologies RSS Feed RSS

Heathrow Airport and Kuwait Airport deploy new explosives detection screening technology for upgraded security

FAA invests $479.1m in airport infrastructure grants

October 8, 2021

The U.S. Department of Transportation’s Federal Aviation Administration (FAA) awarded more than $479 million in airport infrastructure grants to 123 projects at airports across all 50 states, American Samoa and Puerto Rico.


Read More
Man holds smart phone in front of computer

NSA awards $500,000 cybersecurity grant to University of Missouri research

October 6, 2021

Cybersecurity researchers from the University of Missouri seek to develop a security tool that allows smart devices to learn from past cyberattacks with minimal user interaction. The cybersecurity feature would be functional across different types of smart devices and aim to prevent both small- and large-scale cyberattacks in the future.


Read More
Swedish-rail image

Swedish Rail provides body cameras for its train staff

October 4, 2021

Train staff are equipped with body cameras to further monitor activities in train cars and on platforms. Swedish rail company SJ AB aims to increase safety and security for its passengers with the technology.


Read More
Two police officers partake in ALERT demonstration

Florida police department installs emergency response technology

October 4, 2021

The Coconut Creek Police Department has installed Active Law Enforcement Response Technology (ALERT), which connects police to surveillance feeds and security systems in participating local organizations in the event of an emergency.


Read More
WKS restaurant logos

WKS Restaurant Group deploys video-verified intrusion monitoring

September 28, 2021

Integrated intrusion alarm monitoring across more than 380 restaurants within the group allows stakeholders to cut down on false alarms and standardize security response.


Read More
cyber-security-stock__VUZMJNJVCL__.jpg
Advertisement
Sponsored By
ConvergeOne

Service Delivery for Your Entire IT Infrastructure

September 24, 2021

Maintaining an optimized, healthy, and modern IT infrastructure is crucial for the survival of any business. ConvergeOne IT Managed Services, powered by OnGuard, allows IT staff to rest easy knowing that a highly-skilled team of engineers leveraging an industry-leading management platform are watching over their customer’s environment. 


Read More
Border checkpoint

US border patrol introduces facial recognition at Texas bridge

September 21, 2021

Travelers entering the U.S. via the Anzalduas International Bridge can participate in the facial recognition pilot program, which compares images of passengers to their previously stored travel documents.


Read More
lens

Seat detection, flood monitoring and aggressive behavior analytics: Is this the future of your video surveillance?

September 16, 2021

A new developer challenge yielded some interesting and innovative analytics applications that could make their way to your SOC soon.


Read More
iPhone

Find the balance between security and privacy in a BYOD world

Patrick Harr
September 16, 2021

Given the growth of BYOD over the past year or so, security professionals must review their current endpoint security strategies.


Read More
hacking freepik

What the Kaseya attack can teach local governments about preventing third-party data breaches

Case Study
Joel Burleson-Davis
September 15, 2021

Tony Bryson, Chief Information Security Officer for the Town of Gilbert, Ariz., scaled the town's cybersecurity defenses by adopting a preventative solution through a  third-party security company to help to mitigate the risks associated with supply chain attacks.


Read More
Previous 1 2 … 16 17 18 19 20 21 22 23 24 … 143 144 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • hacking vital data
    Sponsored byConvergeOne

    Securing Vital Data through a New Age of Cyberattacks

Popular Stories

casino

Casino security on the Las Vegas Strip

police-alert-freepik1170x658v5.jpg

DHS issues national terrorism alert

security-training3-freepik1170.jpg

10 tips to develop cybersecurity knowledge within organizations

docs-freepik1170x658v2.jpg

Microsoft Office zero day vulnerability discovered

data-breach-90-freepik1170x658.jpg

Chicago Public Schools suffers massive data breach affecting student, staff data

Clear Seas Research

Events

October 28, 2021

Ransomware Readiness: The Rise of Double and Triple Extortions

Ransomware and the propulsion of the extortion economy has rapidly eclipsed into a national priority. Recently, we observed the catastrophic impact of a widescale ransomware attack impacting gas pipelines and raising national gas prices overnight.
June 29, 2022

How to Build and Scale a Security Operations Center (SOC)

Security Operations Centers (SOCs) are a crucial component of safety and security culture. They support many strategic business objectives, from lowering costs and minimizing risk to improving employee trust and morale.

View All Submit An Event

Poll

Business Travel Security

Does your organization plan to reintroduce business travel in 2022?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Clear Seas Research

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2022. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing