If you’re limiting your business to selling surveillance technology as a capital expense, you’re leaving a lot of money on the table.
Cybercriminals are taking a toll on small businesses. Revealed here are some of cybercriminals' most popular tactics and how small businesses can counter-act them.
The University of East Anglia (UEA) was an early adopter of IP video surveillance in 2005. Milestone partner, Check Your Security (CYS), brought together a number of standalone CCTV systems into one IP-based monitoring system that is proving it can grow with the university.
Helping the state of Tennessee with a solar-powered, IP video-based solution to catch wild hogs, ICRealtime has installed an autonomous remedy by harnessing the power of Verizon’s nationwide cellular network.
Don't become the next Internet victim! From lurking spyware to sophisticated hackers, you need to build a line of defense to help ensure safe Internet browsing. Consider the following tips to establish your safe browsing plan with Internet Explorer.
Scalable system architectures have been the source of many debates within the security industry.
Comtrol Corporation, a manufacturer of industrial device communication products, has released the RocketLinx ES7106-VB industrial Power over Ethernet (PoE) switch.
Security principles have not changed much in the past 30 years, but the application of those principles is shifting daily. Addressing integrated security disciplines to ensure a cohesive and collaborative security solutions environment in any organization requires a number of coordinated things to happen efficiently.
InformationWeek Reports, a service provider for peer-based IT research and analysis, announced the release of its latest research report.
Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.
A study by nCircle found that 76 percent of security professionals believe U.S. cyer security has increased over the last 12 months.
Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.
Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.
The U.S. General Services Administration (GSA) has announced an important benchmark that will pave the way for agencies across the federal government to accelerate adoption of cloud computing.
Georgia Tech researchers are launching a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.
Almost 40 percent of North American security systems integrators would prefer to deal with IT distributors when purchasing their IP-based video surveillance products, according to a new report from IMS Research.
Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.
AVG Technologies recently released its Q1 2012 Community Powered Threat Report. The report highlights the growing use of mobile devices to connect with social networks and how this is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices running Android.
Open source technology can help military and other government entities modify software quickly without sacrificing data security. That flexibility, coupled with lower overall cost, is helping fuel a rapid increase in government adoption of open source software, advocates say.
This quarter saw a significant shift in the way the security industry approaches targeted attacks and advanced persistent threats, which are now viewed more as a long-term, ongoing campaign versus the typical "smash-and-grab incidents" favored by cybercriminals in the past, according to the Trend Micro Q1 2012 Security Roundup Report.