Emerging Technologies

Read: SIA Government Summit 2016 to Host Discussions on Drones and Other National Security Topics

SIA Government Summit 2016 to Host Discussions on Drones and Other National Security Topics

Keynote speakers and conference sessions for this summer’s event were announced.

Read: 6 Motives for Small Business Owners to Invest in Data Security

6 Motives for Small Business Owners to Invest in Data Security

Budgeting to protect your customer’s sensitive information from a data breach only makes good business sense.

Read: Serious Security Flaws Found in Samsung SmartThings Platform

Serious Security Flaws Found in Samsung SmartThings Platform

Computer scientists have discovered vulnerabilities in Samsung’s smart home automation system that allowed them to carry out a host of remote attacks.

Read: Rise in Managed Security Services Fueled By Increased Corporate and Govt. Insecurity, IHS Says

Rise in Managed Security Services Fueled By Increased Corporate and Govt. Insecurity, IHS Says

With computer hacking and other persistent threats on the rise, the North American managed security services market is forecast to be $26.9 billion in 2020

Read: How Security Integrators Should Secure Critical Infrastructure

How Security Integrators Should Secure Critical Infrastructure

Four integrators explain what specialized design, installation and service needs this challenging sector requires.

Read: Drones Could Soon Have Bomb-Sniffing Technology to Fight Against Terrorism

Drones Could Soon Have Bomb-Sniffing Technology to Fight Against Terrorism

A lab at the University of Wisconsin-Madison developed the technology, which is said to be a year away from being in the field.

Read: Global Robotics Market Expected to Double by 2020, Forecast Predicts

Global Robotics Market Expected to Double by 2020, Forecast Predicts

The market is expected to reach $53.2 billion by 2020 with the APAC region expected to continue to dominate.

Read: 10 Steps Integrators Should Use to Ensure Manufacturers’ Products Are Cyber Secure

10 Steps Integrators Should Use to Ensure Manufacturers’ Products Are Cyber Secure

More and more security devices are being placed on networks and therefore need to tested and designed to withstand hacking attacks. Learn what to be aware of, look for and verify in a vendor.

Read: Protection 1’s Managed Services Push Underscores Critical Need for Data Security

Protection 1’s Managed Services Push Underscores Critical Need for Data Security

Protection 1 provides security-only networking infrastructure for corporate end users to safeguard sensitive data from cyber breaches.

Read: 3 Easy Steps to Protect IP Cameras From Hackers

3 Easy Steps to Protect IP Cameras From Hackers

IP cameras are just as vulnerable to cyberattacks as any other networked device. Here are three mandatory steps that will eliminate network security weaknesses.

1 108 109 110 111 112 128
Get Our Newsletters