Guest Authors's Latest Posts

Read: Wyoming School District Selects IDIS to Meet Surveillance Needs

Wyoming School District Selects IDIS to Meet Surveillance Needs

The Washakie School District No. 1 required video surveillance coverage across all of its geographically separate school campuses.

Read: Speco Technologies: The Power of 2-Factor Authentication

Speco Technologies: The Power of 2-Factor Authentication

Using Speco Access in conjunction with Speco’s facial recognition gives an added level of security and an extra form of verification to guarantee a user is who they say they are.

Read: Make Sure to Follow These Dealer/Integrator Cybersecurity Basics

Make Sure to Follow These Dealer/Integrator Cybersecurity Basics

Careful attention to IT security is a critical component of the deployment of any security system. Are you following these cybersecurity best practices?

Read: Why a Long-Term Vision Is Essential to Safely Reopen Businesses

Why a Long-Term Vision Is Essential to Safely Reopen Businesses

While video analytics can form the core of a COVID-19 response to help open shuttered facilities, no AI platform will be sufficient by itself.

Read: Examining AI Trends and Growth in Home Security

Examining AI Trends and Growth in Home Security

Parks Associates explains the benefits that will be realized in full once there is an alignment of AI-enabled hardware, system software and intelligent call center services.

Read: Cracking Cybersecurity’s RMR Algorithm

Cracking Cybersecurity’s RMR Algorithm

It’s time to view cybersecurity as a new profit center. A cyber expert reveals how to assess opportunity and adopt strategies to drive more RMR.

Read: How to Sell Smart Locks to a Technophobe

How to Sell Smart Locks to a Technophobe

With the right approach, security dealers can convince technophobic parents and homeowners they can learn to love smart locks.

Read: How Counter-Drone Tech Can Safeguard Critical Infrastructure

How Counter-Drone Tech Can Safeguard Critical Infrastructure

With new security issues arising from the coronavirus-related shutdown, the world continues to see a sharp increase in negative uses for drones.

Read: How to Protect Remote Workers From Business Email Compromise Attacks

How to Protect Remote Workers From Business Email Compromise Attacks

Work-from-home employees need to ward against business email compromise (BEC), which is particularly easy to execute and surprisingly hard to detect.

Read: Solving the Residential Security Conundrum of COVID-19

Solving the Residential Security Conundrum of COVID-19

The novel coronavirus is causing a sea change in consumer behavior, but security professionals who stay customer-centric in times like these will find ways to strengthen their position.

1 40 41 42 43 44 75
Get Our Newsletters