This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Enterprise organizations around the world are adapting to work from anywhere (WFA) models. The challenge of securing WFA environments could be solved by biometric authentication.
The Indian Institute of Technology Delhi (IIT Delhi) recently migrated their physical security solution to one that includes artificial intelligence (AI)-powered video surveillance. Find out more about the solution in this case study.
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have published the first of a four-part series, Security Guidance for 5G Cloud Infrastructures.
The aquarium has already seen an increase in guest satisfaction since installing the weapons detection system and has been able to reassign half of their security staff to locations other than entryways.
Defending the medical device supply chain, cracking down on ransomware and monitoring new technology are all priorities for cybersecurity professionals in the healthcare field. In a panel hosted by BD, Eric Decker, William Landry, Inhel Rekik and Scott Shindledecker discuss top of mind issues for healthcare cybersecurity professionals.
A multi-use commercial and residential building will be secured by an access control and visitor management system from AMAG Technology and West Fire Systems. Read more about the tools used in this security case study.
Accessibility in security has not been a critical focus for the security industry. And, security should never be an oversight. Neither should accessibility.
Catalytic converter theft has increased over the past year, with people targeting the relatively accessibly and valuable technology. Video surveillance can serve as a preventative security solutions against these crimes.
As major organizations integrate passwordless solutions into their products, the FIDO Alliance's new Online Authentication Barometer finds that biometrics are gaining in use and popularity.