Filed in Security

Inside Atlanta’s High-Profile Security Control Rooms
In conjunction with its hosting this year's recently completed ASIS annual Seminar and Exhibits, media members took a tour of security operations and command centers around Atlanta.

Why Wireless Is the Wild West of Security
Here is a look at the latest in standards and new products in wireless security technology.

Kimray Inc. Applies All-in-One Mobile Emergency Notification App
With In Case of Crisis, Kimray can securely share institutional-specific emergency procedures, safety guidelines and business continuity plans with employees, including step-by-step actions to take in cases of fire, inclement weather, work-related accidents and schedule changes, among other possible situations.

First Contactless Fingerprint Credit Card Unveiled
MasterCard and Zwipe announce the launch of the world's first biometric contactless payment card with integrated fingerprint sensor

20 Key Trends Emerge From ASIS 2014
The 60th Annual ASIS Int'l Seminar and Exhibits was a rousing success, with plenty of telling industry takeaways.

Cybersecurity Is a Top Concern for Energy Companies
Cybersecurity ranked sixth a year ago and now is the fourth-highest concern for electric utilities, behind reliability, environmental regulation and economic regulation, according to a new survey.

Get Your Employees to Care About Cyber Security, Become Secure
Many employees don't worry about clicking on unknown links and visiting sketchy sources. When they are educated about the personal threats of cyber attacks, they become a lot less laid back.

Compatibility is Critical: A Look at IP Camera-to-VMS Integration
Whether deploying entirely new IP-based systems, expanding existing systems with new IP cameras, or upgrading the VMS software to obtain new functionality, the compatibility between the IP camera and the VMS has become a critical component.

Mass Notification Systems Help Improve Business Practices
Mass notification systems were primarily installed as a way to inform in the case of an emergency. However, with advancements in technology, these systems have taken on a broader scope in functionality.

Brian Krebs Gives Interview On Credit Card Hackers and Sellers
Companies need to beware of possible security breaches. Hackers are able to steal critical information that could destroy an enterprise's reputation. Brian Krebs spoke to NPR about these dangers.

Law Firms Utilize Videoconferencing by Choosing the Correct Security Measures
Brian Loncar has built his firm all throughout Texas by utilizing videoconferencing for face-to-face meetings. The reason he was able to do so was to make sure these meetings were secure.

The Cloud: Public, Private, or Both?
There are several configurations for setting up a cloud system for your company's needs. Which system suits your needs best? Learn about each in our feature.

Is BYOD a CIO’s Worst Nightmare?
Employees use their personal devices for work both within and outside of the office. With the network exposed to outside threats, and with sensitive information leaving the safety of the network, how do technology decision makers protect their company?

Hybrid Clouds an Emerging Solution in Large Enterprises
A combination of public and private cloud environments are allowing companies to monitor and control security for stored data, while saving on pricey services from private cloud systems.

Inovonics and Mercury Partner to Offer Integrated Access Control Solution with Mobile Duress.
Inovonics and Mercury partner for joint security venture that allows Mercury and its OEM partners to incorporate Inovonics mobile duress system within its access control platform.




How do you solve the issue of noise in the open-space work environment? Add more noise.