Facial Recognition: Balancing Privacy and Security
A combination of Internet of Things (IoT) technology, holistic urban development models, and more widespread and reliable connectivity have evolved…
A combination of Internet of Things (IoT) technology, holistic urban development models, and more widespread and reliable connectivity have evolved…
Countless high-profile, high-stakes incidents over the past few years have made it clear: anyone can be hacked, and there is…
We sat down with Jason Cansler, owner of UASidekick, LLC, which provides software for UAV pilots to maintain compliance with…
General John F. Kelly, U.S. Marine Corps (RET) to Speak on Geopolitics and Security Join us at Global Security Exchange…
By Jonathan Spero, M.D., CEO InHouse Physicians With corporations placing an increased importance on duty of care, it is a…
By Kathy Winger, Attorney at Law As a business attorney, one of my most important obligations is to help clients…
By Richard Ham Unmanned Aircraft Systems (UAS), commonly referred to as “drones” are changing the face of security surveillance.…
3 Perimeter Protection Technologies Large Enterprises Should Implement By Mark Brown, Director of Security and Surveillance, FLIR Systems, Inc. Enterprises…
By Paul Ducker Integrating security projects within a large public transport department in a state the size of Texas…
By Jason Rosselot, CPP, CISSP Your building is talking. Can you quiet it down before hackers hear? “Door held…
By Richard Smith The horrific events in Parkland, Florida, Sutherland Springs, Texas, and, unfortunately, other locations around the U.S.,…
By Brittany Galli Why do we consistently wonder why we aren’t farther ahead in our profession or respected like…