Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog » Technologies

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Car Racing Surveillance in Holland

June 13, 2008
ACTi and NetAware, a professional Internet solution provider in Holland, have successfully installed an IP surveillance system in Circuit Park Zandvoort, and enabled the world to join the car
Read More

New Company to Specialize in Fiber Optic Video

June 11, 2008
Communication Networks of Danbury, Connecticut, doing business as ComNet, has been formed by George Lichtblau. ComNet will focus on providing connectivity and communications network solutions to the security, intelligent
Read More

Much Too Costly to Keep One in 100 Americans Behind Bars

May 27, 2008
SECUREtrac Corp., in electronic monitoring solutions, provides a supervision alternative that is significantly less costly and arguably more effective for states spending as much as $45,000/year per inmate to
Read More

IP Monitoring of Stadium Renovations

May 20, 2008
The ability to remotely view video of building renovations via an Internet-connected security camera has become a popular innovation in the construction industry. When that renovation involves the home
Read More

Key Control at Thomson Reuters

May 15, 2008
In the news business, it is common practice to check information with one or more sources to ensure and verify its accuracy. It was no surprise then that this
Read More

PoE Outdoor Camera Housing

May 8, 2008
Zalud’s Blog has learned that Videotec launches the new VERSO True-PoE and, thanks to the benefits of High Power PoE (Power over Ethernet), it is now possible to feed
Read More

Absolute Software Key To Stolen Laptop Recoveries

April 30, 2008
Absolute Software Corporation (“Absolute” or the “Company”) (TSX: ABT), the leading provider of firmware-based, patented, Computer Theft Recovery, Data Protection and Secure Asset Tracking solutions today highlighted several recent
Read More

Take a Tour of a Modern Day Chemistry Facility

April 28, 2008
The American Chemistry Council (ACC), today posted on americanchemistry.com, a video tour of a modern day chemistry facility. The video tour will provide viewers with an inside look into
Read More

Voice Biometrics to Address On-Line Banking Fraud

April 18, 2008
VeCommerce, provisioning intelligent call steering, voice biometric and voice self-service solutions, tells Zalud’s Blog that the financial services industry should consider voice biometrics as a more secure and convenient
Read More

HID Global Showcases ID Accessories

April 7, 2008
After ISC -- HID Global showcased a new line of ID accessories at the ISC West International Security Conference and Exposition. This new line will include a wide selection
Read More
Previous 1 2 … 16 17 18 19 20 21 22 23 24 25 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing