Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Dedicated Micros Announces DV-IP Codec

April 7, 2008
After ISC, Dedicated Micros, part of AD Group, announces the DV-IP Codec, a single channel selectable encoder and decoder combination unit designed to increase the flexibility of surveillance networks.
Read More

Cernium Unveils Analytics Application Software

April 7, 2008
After ISC -- Cernium Corporation, a developer of video analytics-enabled products, announced the launch of its next-generation Perceptrak software, which seamlessly integrates with leading video management systems to provide
Read More

Intransa Announces Widespread Participation In IP Storage Certification Program

April 4, 2008
Intransa, the provider of shared, scalable and simple external IP storage solutions, today announced that over thirty physical security leaders and up-and-comers had now earned the coveted “Security-Grade IP
Read More

VEREX Next Generation Security Products

April 4, 2008
From ISC. VEREX announced today the launch of three new security products, the VeDVR, an embedded digital video recorder, the HSC-IP alarm monitoring solution and an upgraded version of
Read More

Sony Cameras with Megapixel Capabilities

April 4, 2008
From ISC, Sony is entering the megapixel marketplace with several new additions to its lineup of IP-based security network cameras, announced today at the 2008 International Security Conference (ISC)
Read More

New Storage Expansion Units

April 4, 2008
From ISC, Mitsubishi Digital Electronics America’s Imaging Products Division today announced availability of its new DX-ZD6UE storage expansion unit for DX-TL4500U, DX-TL4700U and DX-TL5000U DVRs. The expansion units may
Read More

Anti-theft Technology for Notebook Computers

April 4, 2008
Heard at ISC, Absolute Software Corporation (“Absolute”), (TSX: ABT), the leading provider of firmware-based, patented, Computer Theft Recovery, Data Protection and Secure Asset Tracking solutions today announced that its
Read More

Honeywell Expands Camera Line

April 3, 2008
At ISC, Honeywell released its Performance Series, the latest addition to the company’s extensive portfolio of security cameras. The Performance Series includes new lines of indoor and indoor/outdoor mini-domes
Read More

Mitsubishi New Line of Security Cameras

April 3, 2008
From ISC, Mitsubishi Digital Electronics America’s Imaging Products Division today announced its new line of security cameras as a complementary offering to its industry-leading digital security solutions. The new
Read More

It’s H.264 for Axis Communications

April 3, 2008
At ISC, Axis Communications announced a new generation of AXIS Camera Station, the company’s comprehensive video management software for monitoring, playback and event management of up to 50 Axis
Read More
Previous 1 2 … 146 147 148 149 150 151 152 153 154 … 174 175 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing