Threat actors are not only increasing the frequency of their cyberattacks, they are constantly working to evolve their techniques to capitalize on unsuspecting end users and unpatched software alike. A recent study conducted by Oracle asked policy makers, C-Suite executives about their insights regarding cyberthreats, and their opinions on how to address them.
Category: Security Hardware and Technology
The tools of the security trade are advancing at an extraordinary pace. We take a look at the latest security hardware and software, from malware and cyberattack detection to cameras to motion sensors. These articles will help you determine what gadgets may be best for your security strategy—and what will fit your budget.
Every IT department has some old gear that’s functional, but is built to handle old storage material or can’t handle modern work demands. It can often be a pain to recycle, and, it’s still functional, so why get rid of it? Who knows, maybe someone will need a file stored on a legacy medium. Well, […]
Managing the storage requirements of integrated electronic systems is increasingly becoming a challenge. Larger files, changing retention policies, and new analytics and search tools offering greater forensics, are pushing storage to the max.
A successful business is expanding locations on a regional level and needs surveillance at all its sites. A mini-city, large-scale, master-planned community pops up with its own security challenges. Their needs are met in unique ways.
Converged systems support the goal of having one centralized point of command and control. Backward and forward compatibility plays a major role in bringing together critical functions from a wide scope of devices and solutions that deliver safety, convenience, cost-effectiveness, and energy efficiency.
There is currently a lot of hype about the “smart cities” concept, and communities and governments around the world are jumping onto the bandwagon. While most of the focus is on eliminating inefficiencies in a variety of infrastructure systems–from transportation to utilities and beyond—the reality is a “smart city” should equate to a “safe city.”
No one really likes dealing with their cable and internet provider, as a phone call for a simple service request usually entails automated menus, redirected calls, and when you finally get someone on the line, a hard sales pitch to expand your service package. However, one rather enterprising Spectrum employee in Riverside, California took it […]
Workplace violence is unpredictable … or is it? Wearables and predictive analytics are more than just trendy tech tools—they have the potential to give safety managers an edge in foreseeing and preventing workplace violence.
With the cost of IP-based surveillance cameras, access controllers, and other security devices continuing to fall, there is a lot of interest in deploying such equipment pervasively. The challenge in such applications, however, is wiring. Often, cameras and other devices need to be placed in areas where electrical power is readily available, but network connectivity […]
There is hidden value in security systems that many users do not tap into which can offset the cost of the initial investment in IP security equipment.