For most businesses, achieving the bottom line is the goal the whole team should strive for. But can they do that effectively when security threats get in the way? Besides dangers in cyberspace, other ...
Intelligent physical security system devices—especially AI-enabled video cameras—have become high-value targets for hackers, who now deploy malware explicitly designed to infect these devices and lie ...
Video surveillance, face recognition and artificial intelligence have become common in physical security. For colleges and universities, that raises some serious questions about privacy. Benefits to ...
Steve Orrin is the federal CTO for Intel Corporation. He has held architectural and leadership positions at Intel, driving strategy and projects on identity, anti-malware, HTML5 security, cloud and ...
Verkada, a leader in AI-powered physical security technology, and Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, today announced a strategic distribution partnership. Under ...
MONTRÉAL—Genetec, a global provider of enterprise physical security software, has shared the results of its 2025 State of the Physical Security Report. Based on insights from over 5,600 physical ...
Genetec surveyed over 7,000 physical security end users, channel partners, and consultants about new technologies they’re ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. Cities and counties have started deploying servers and data ...
Protecting students, teachers and staff requires a 360-degree approach as part of a holistic physical security strategy. Not only do schools need physical security measures, such as door locks and ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. Artificial intelligence is ...
When we look back at the physical security environment of the mid-2020s, the greatest hurdle was not a lack of technology, but a lack of connection. Campus safety teams were drowning in data, forced ...
If you’ve managed secure cryptographic infrastructure, you know the challenges of physical secure rooms, from the high cost of SCIF-standard facilities to the operational burdens of multi-operator ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results