Blog Archives




 
  • Time to take a stand against state-sponsored cyber attacks

    By Joel Griffin - Friday May 10, 2013
    Earlier this week, the Pentagon issued a report accusing the Chinese government and military of conducting cyber attacks against the U.S. in an effort to gather intelligence on diplomatic, economic and defense programs. This follows a report released...
  • City of big shoulders to host ASIS 2013

    By Deborah L. O'Mara - Thursday May 2, 2013
    The vibrant and super-trendy city of Chicago plays host to ASIS in September and I had a sneak peek at the fun and flavor expected at the upcoming conference during a recent media tour of the soon-to-be “ASIS kind of town.” Expecting some 20,000...
  • Knowing crime trends before the door

    By Rob Phillips - Tuesday April 30, 2013
    Americans will never forget the surreal footage of heavily armed police officers combing Boston’s quiet neighborhoods last month in search of the Boston Marathon bombing suspects. Although it was a terrorist crisis of international significance...
  • The Bird is the Word

    By Paul Rothman - Wednesday April 24, 2013
    When analyzing an emergency mass notification plan, unfortunately it tends to take an actual emergency to see how it works in action. Such was the case in Boston last week, when jammed phone and SMS lines created snarled and ineffective...
  • Video surveillance plays key role in Boston's bombing investigation

    By Steve Lasky - Friday April 19, 2013
    What began decades ago in the UK as a way to control soccer hooliganism has come full circle as a result of the senseless bombings this week during the Boston Marathon. The use of video surveillance by law enforcement, with the cooperation of the...
  • Fast50 winners unveiled

    By Deborah L. O'Mara - Friday April 5, 2013
    Today, Security Dealer & Integrator magazine announced the winners of its second annual Fast50 best practices and ranking program. You can see all the winners here in our digital edition and on SecurityInfoWatch.com . There are three different...
  • Keeping up with hackers

    By Joel Griffin - Friday April 5, 2013
    In February, President Barack Obama issued a cybersecurity executive order that directs U.S. intelligence agencies to share information on potential cyber threats with private businesses that are considered part of the nation’s critical...
  • Much ado about drones

    By Joel Griffin - Thursday March 28, 2013
    Ever since Congress approved the FAA Modernization and Reform Act of 2012, which called for the agency to open up domestic airspace for unmanned aerial vehicles (UAVs), there has been an outcry from privacy advocates, as well as federal and state...
  • Keeping up with Innovation

    By Paul Rothman - Friday March 22, 2013
    It seems like someone pressed the fast-forward button on technology a few years ago, and the breakneck pace has put the security industry on a virtual speedway — with many end-users, integrators and even vendors desperately trying to avoid being left...
  • March hoop tournament brings madness to IT administrators

    By Steve Lasky - Wednesday March 20, 2013
    As the NCAA collegiate basketball tournament tips off this week, March Madness is not just reserved for the court. Because if you are one of thousands of IT network managers across the United States, March means more stress on your corporate network...