SSI logo

Physical-IT Security Convergence

Top Story

Proactive Paths to Thwart Prox Card Threats

Security integrators need to work with clients to stay ahead of proximity card threats.


Latest in Physical-IT Security Convergence

NICE Systems is selling its video surveillance unit to private equity firm Battery Ventures for up to $100 million, its second divestment in three months as it focuses more on its analytics business. Its new name is Qognify. Rodney Bosch · August 03, 2015

Zimperium, a security company, uncovered a flaw in Stagefright, a media playback tool built into Android smartphone, which could allow malicious hackers to steal anything on the device, including credit card numbers or other personal information. SSI Staff · July 28, 2015

Microsoft is planning to acquire Adallom, an Israeli cybersecurity company that offers end users information security technology on remote servers, for $320 million. SSI Staff · July 22, 2015

Stanley Security’s Rich Mellott discusses market forces driving business intelligence (BI) in Security Sales & Integration’s latest IT Intelligence column. By Rich Mellott · July 10, 2015

Cybersecurity firm Kaspersky Lab reveals that third-parties can hack video surveillance networks and manipulate the data transmitted through it. SSI Staff · May 29, 2015

Hospitals and medical clinics are regarded as sanctuaries for patients, so it's crucial that these facilities are secure. Let's examine health-care facilities’ escalating security needs. Bob Stockwell · May 23, 2015

NICE Systems' acquired cyber and intelligence business unit will be merged into Cyberbit, an Elbit Systems subsidiary, in order to consolidate the parent company's cyber activities. SSI Staff · May 21, 2015

Perhaps the most notable change to PSA-TEC was the inclusion of a new cybersecurity education track and a series of vendor cybersecurity solutions spotlight sessions. Find out what they had to share. Scott Goldfine · May 10, 2015

Eagle Eye Networks has released as whitepaper that offers 12 cyber-safe best practices for security cameras. The document covers attack vectors and vulnerabilities for both cloud-managed video surveillance systems and traditional video surveillance systems that are connected to the internet or the company’s private network. SSI Staff · April 30, 2015

One factor advancing the integration of building systems is the impressive range of monitoring and control capabilities today’s building automation systems can provide. What’s more, rich data sets can be stored and analyzed to achieve newfound operational efficiencies. Rodney Bosch · April 27, 2015




LATEST SECURITY RESOURCES


View all security resources & downloads

EDITOR'S CHOICE