This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Security Magazine readers are invited to the HID Desktop launch specifically for End Users, in New York City on March 3. Please register by following the link below and/
Pelco has signed an agreement to sell the Intelli-M® Electronic Access Control product line to infinias, LLC. The deal which will include intellectual property, assets, and products in development
Writing in an upcoming Security Magazine, Michael Varnum of Corporate Risk International, the global market has continually created new business opportunities for U.S. companies of every size. However, with these
Megapixel cameras and the latest NVR technology can catch and prevent thousands of dollars in theft while achieving total system payback. In the April issue of Security Magazine, there
A sidebar to the new President taking office was the effort by the Secret Service to develop a BlackBerry that was super-secure. The device may prove secure or not.
Zalud’s Blog wasn’t at Davos, Switzerland, but got word of a first global study on the security of information economies. In the study, Unsecured Economies: Protecting Vital Information, security
Millions of people gathered around their computers to watch Barack Obama be sworn in as the 44th President of the United States of America. Thanks in part to streaming
The Frontier Version 5.8 software upgrade is a comprehensive security solution that provides real-time monitoring for access doors and alarm points for local/remote locations in the healthcare, airport, higher
While mass notification systems get the word out to employees, students and visitors, it’s a tougher nut to crack for individuals to call for help and provide situational awareness
Zalud’s Blog has learned that RS2 Technologies, a provider of access control systems, has integrated its Access It! access control software with wireless locksets from ASSA ABLOY group brands.