The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Thousands of security management practitioners will file through the Georgia World Congress Center in Atlanta Sept. 15-18 for the 54th Annual Seminar and Exhibits. More than 23,000 security professionals
Johnson Controls, Inc., a global multi industrial company and global security systems provider and integrator, today announced a new strategic alliance with Carter Brothers, LLC, an Atlanta-based Minority Business
Beijing Capital International Airport’s (BCIA) Terminal Three just got some new technology to say goodbye to Olympics visitors. GE Security’s CTX 9000 advanced technology explosives detection systems are helping
Researchers at Queen Mary, University of London intend to find the answers. Queen Mary, University of London, one of the UK’s leading higher education research institutions, has installed a
You know when a certain type of technology is really hot – when most everyone in Congress votes to provide federal grants so that organizations can buy it. That’s
As millions of students start a new school year, results of a new national survey indicate that nearly half of the parents of kindergartners to eighth graders are concerned about
Sun Microsystems and Aware, a provider of biometrics software, announced the integration of Aware's Biometric Services Platform (BioSP) with Sun identity management solutions. The integration of BioSP with Sun
To increase passenger and personnel safety, Miami International Airport (MIA) selected Ericsson Federal to supply, deploy and execute systems integration of a high-capacity digital communication and video surveillance system.
SMS Holdings, a provider of security and facility management services and parent company of Valor Security Services, just rolled out a major business expansion with the acquisition of Brantley
Zalud’s Blog has learned that, on Wednesday, August 6, Symantec commissioned an anonymous survey to explore Black Hat attendee’s views on vulnerability research and the challenges and opportunities they