The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
U.S. Department of Homeland Security (DHS) Secretary Janet Napolitano announced today that Predator Unmanned Aerial System (UAS) flights will begin out of Corpus Christi, Texas, beginning on Wednesday, Sept.1. With
New data suggests that many of the industry's largest and most recent data breaches were not only preventable – they could have easily been spotted with the naked eye. Consider
A United States Navy drone wandered into restricted airspace early this month around Washington D.C. before operators could stop it. A Navy spokesmen could not say later if anyone on
Low-cost vaccines that may have helped prevent the kind of salmonella outbreak that has led to the recall of more than a half-billion eggs haven’t been given to half of
For perimeter monitoring, outdoor video surveillance provides information not available with other technologies. There is greater use outdoors, thanks in part to the growing application of megapixel cameras. But there
Today, most office workers carry mobile phones into work. Much of the time, the devices are more advanced smartphones, such as Android-based phones, Blackberry devices, or Apple iPhones. The employees
After not one employee felt a scratch when a suspect fired more than 100 rounds at the McKinney, Texas public safety building August 17, the building itself became a hero.
Federal, state and local agencies last week responded to a simulated attempt by extremists to seize radioactive cobalt from the Massachusetts Institute of Technology (MIT) for use in a radiological
iSecurity is now available On-Demand! All content, exhibitors, webinars and Ask the Expert sessions from both the March and August shows are available for viewing through March 1, 2011. Fast,
A research team at North Carolina State University has used a building ventilation duct to at least triple the normal distance that radio waves emitted from passive RFID tags can