Emerging Technologies

Read: Tips to Tighten Your Cyber Defenses and Combat Sophisticated Threats

Tips to Tighten Your Cyber Defenses and Combat Sophisticated Threats

Integrators must implement a successful cybersecurity strategy to protect their reputation, employees and customers.

Read: Sizzling Thermal Opportunities Await

Sizzling Thermal Opportunities Await

Though thermal video was already gaining popularity when it began to be utilized for temperature monitoring during the pandemic, it still has more to offer. Here’s how its use cases can broaden integrator opportunities.

Read: How to Calculate — and Communicate — Return on Security Investments

How to Calculate — and Communicate — Return on Security Investments

Integrators can use ROSI to explain how physical security systems provide a return in terms of both risk mitigation and other business value.

Read: 2022 SIA Chair’s Award Recipient Discusses Cybersecurity Trends, Need for Diversity

2022 SIA Chair’s Award Recipient Discusses Cybersecurity Trends, Need for Diversity

After spending 17 years working at security integration firms, Antoinette King started her own Cybersecurity consulting firm to specifically serve the physical security industry.

Read: Making Sense of NFPA 72’s New Cybersecurity Chapter

Making Sense of NFPA 72’s New Cybersecurity Chapter

The 2022 edition of NFPA 72 features a new chapter dedicated to cybersecurity. Here’s what integrators need to know.

Read: Vivotek Unveils Facial Recognition Tablet

Vivotek Unveils Facial Recognition Tablet

Vivotek says the FT9361-R’s deep learning AI technology can precisely detect a real, living/breathing person from that of a high definition photo.

Read: Why Most End-User Threat Intelligence Is Awful (and What to Do Instead)

Why Most End-User Threat Intelligence Is Awful (and What to Do Instead)

Threat intelligence is a collection of data containing known dangerous and suspicious IP addresses, domains, email addresses, file hashes and attacker groups.

Read: Axis Issues Response to Cyber Attack on Internal Directory Services

Axis Issues Response to Cyber Attack on Internal Directory Services

Despite indications that internal directory services were compromised, Axis says no customer information was found to be affected in any way.

Read: Eagle Eye Networks Completes SOC 2 Type 2, ISO 27001 Audits

Eagle Eye Networks Completes SOC 2 Type 2, ISO 27001 Audits

SOC 2 Type 2 and ISO 27001 security audits provide independent validation of the company’s commitment to meet and exceed industry standards.

Read: U.S. Cyber Agency, Others Warn Ukraine Crisis Could Lead to More Cyberattacks

U.S. Cyber Agency, Others Warn Ukraine Crisis Could Lead to More Cyberattacks

As more tech firms fall victim to cyberattacks, experts warn threats could increase in the wake of Russian aggression against Ukraine.

1 2 3 4 5 6 112
Get Our Newsletters