The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
With such surveys as the Unisys National Security Index reporting that people are growing more concerned about identity theft and privacy violations, it is no wonder that attorneys would
On-Net Surveillance Systems is partnering with global network connectivity powerhouse D-Link Systems, Inc. to deliver OnSSI's intelligent, open-architecture IP-based video software solutions to D-Link's large customer base. D-Link Systems,
Security leaders should recheck what type of insurance their alarm service has. Brownyard Group tells Zalud’s Blog that it will offer an admitted market for its Alarm Services program,
ASIS International and BSI British Standards will collaborate on the development of a Business Continuity Management (BCM) American National Standard. The standard will be based on the recently published British
From BRS Labs, AISight is an adaptive learning video analytics solution for large-scale deployments that provides awareness and real-time responsiveness to security watch centers. AISight learns what is normal
The Pierce County (Wash.) Sheriff’s Department tells Security Magazine that it used the Sagem Morpho MorpholFace Investigate MFI biometric facial recognition application to identify a suspect by comparing an
AlliedBarton Security Services has earned national recognition for its training programs for the fourth consecutive year on Training magazine's Top 125 list. Last week, Training magazine, the leading business
Datacard Group, in secure ID and card personalization solutions, has released a new Smart Card Designer Tool for Datacard identification software. With it, smart card issuers can configure the
Suddenly chief security officers, chief information security officers, and network managers are seeing dollars in the clusters and clouds. Intransa and Pivot3 are pioneering security video storage clusters while
The global economic downturn continues to impact enterprises and their security and risk strategies. As will be reported in the January issue of Security Magazine – in the Zalud