It is unbelievable how some people are so desperate for money that they risk their very lives for a quick buck. With copper as one of today’s most grisly lures, thieves scale fences to high-voltage distribution sites and cut the copper off live, megawatt lines.
Albuquerque Bernalillo County Water Utility Authority (ABCWUA) has successfully deployed IndigoVision’s IP Video Security Solution to help protect its 300-acre wastewater facility.
Joint surveillance technology test results show a radical reduction in the number of false alarms.
Zambian Electricity Supply Company LTD (ZESCO) has completed a major security project using IndigoVision’s IP video security solution. Working in conjunction with local partner, Security Integrated Systems, and regional distributor, Reditron, the security solution covers a geographical area of more than 1200km.
The U.S. Department of Homeland Security has released a statement that cyber-attacks on critical U.S. infrastructure have jumped 52% compared to last year.
A Los Alamos National Laboratory quantum cryptography (QC) team successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography.
A world record was set by AFL's SkyWrap for the longest wrap cable span ever installed, and it was all caught on video.
This contract expands the Freedom Active Directory to run on the Microsoft Hyper-V Cloud.
Utilities and governments around the world are investing billions of dollars into upgrading the existing analog electric, gas and water grids into two-way communication networks capable of optimizing distribution and reducing costs for consumers.
In developing a comprehensive physical security strategy, it’s important to include a key control plan as part of the overall security package. Key management systems can reinforce access control policies that are already in place and can also help to reduce the costs that are associated with lost keys or unmanaged access. It’s also important to know that it is never too late -- or too early -- to implement a key control and management plan as part of an overall physical security strategy. And if you’re not sure about how to proceed, the following three questions may provide the answers for you.