Filed in Security

First Contactless Fingerprint Credit Card Unveiled
MasterCard and Zwipe announce the launch of the world's first biometric contactless payment card with integrated fingerprint sensor

20 Key Trends Emerge From ASIS 2014
The 60th Annual ASIS Int'l Seminar and Exhibits was a rousing success, with plenty of telling industry takeaways.

Cybersecurity Is a Top Concern for Energy Companies
Cybersecurity ranked sixth a year ago and now is the fourth-highest concern for electric utilities, behind reliability, environmental regulation and economic regulation, according to a new survey.

Get Your Employees to Care About Cyber Security, Become Secure
Many employees don't worry about clicking on unknown links and visiting sketchy sources. When they are educated about the personal threats of cyber attacks, they become a lot less laid back.

Compatibility is Critical: A Look at IP Camera-to-VMS Integration
Whether deploying entirely new IP-based systems, expanding existing systems with new IP cameras, or upgrading the VMS software to obtain new functionality, the compatibility between the IP camera and the VMS has become a critical component.

Mass Notification Systems Help Improve Business Practices
Mass notification systems were primarily installed as a way to inform in the case of an emergency. However, with advancements in technology, these systems have taken on a broader scope in functionality.

Brian Krebs Gives Interview On Credit Card Hackers and Sellers
Companies need to beware of possible security breaches. Hackers are able to steal critical information that could destroy an enterprise's reputation. Brian Krebs spoke to NPR about these dangers.

Law Firms Utilize Videoconferencing by Choosing the Correct Security Measures
Brian Loncar has built his firm all throughout Texas by utilizing videoconferencing for face-to-face meetings. The reason he was able to do so was to make sure these meetings were secure.

The Cloud: Public, Private, or Both?
There are several configurations for setting up a cloud system for your company's needs. Which system suits your needs best? Learn about each in our feature.

Is BYOD a CIO’s Worst Nightmare?
Employees use their personal devices for work both within and outside of the office. With the network exposed to outside threats, and with sensitive information leaving the safety of the network, how do technology decision makers protect their company?

Hybrid Clouds an Emerging Solution in Large Enterprises
A combination of public and private cloud environments are allowing companies to monitor and control security for stored data, while saving on pricey services from private cloud systems.

Inovonics and Mercury Partner to Offer Integrated Access Control Solution with Mobile Duress.
Inovonics and Mercury partner for joint security venture that allows Mercury and its OEM partners to incorporate Inovonics mobile duress system within its access control platform.

UPDATED: 15 Must Have Apps for Cloud Backup and File Access for iOS and Android
Manage, share and backup your Android or iOS device with these great Cloud backup and access apps. Check out apps from developers like Genie-Soft, Google Inc., Mozy Inc., Genie9, ClockworkMod, AgileSoft Resource, Jungle Disk, LLC and iDar LLC

9 Emergency Preparedness, Alert and Recovery Apps for iOS and Android
This collection of emergency apps highlights the true capability of technology in the face of nature's toughest scenes. From first aid apps to radar scanners and disaster-specific apps, this collection provides some of the best resources for disaster preparedness and monitoring from trusted emergency organizations. Check out apps from The American Red Cross, FEMA, Base Velocity LLC. and ME911 for your Android or iOS smart device.

How Secure Is MDM Security?
With the proliferation of mobile devices used for business, there is a need for tighter security than MDM solutions can offer.




Our partner resource gives insight into automation, control, and the possibility of going too far.