IT & Data security
The latest trends in online identity control, encryption and how access control can protect data centers against cyber threats and hackers.

Podcast: Unlocking Video Surveillance
Security cameras are smarter than ever before. The move from analog to IP-based digital video surveillance has allowed cameras to go from a documentary …
Podcast: Unlocking Physical Security Costs
In Episode 2 of the new podcast 'Unlocked', we take you on the journey of an IT Director at a small college as he navigates through the sometimes choppy …
Security will focus more on the user experience
Focusing security solutions more on user experience will help close the gap between planning and compliance, while ensuring that security adapts to rather …
Open and integrated security
The most important technology shift in the coming five years will be the increasing demand for integral security management systems with open IT standards. …
Reducing mobile security risks
Mobility may be a fact of life in just about all enterprises, but that doesn’t mean IT organizations aren’t concerned about its impact on security …
What’s happening in the Cloud?
Cloud computing has changed the way the physical security industry works. And the evolution is far from over, according to experts. The cloud is what delivers …
The symbiosis of digital and physical security
The challenge of modern security reminds one of the 1955 Stargazers hit, "Close the door – they're coming through the window": as soon as you've stopped …
Protecting your assets – personal data
As consumers are beginning to adopt wearable technology, new issues arise. One issue is privacy. How do you deal with all the personal data that wristbands …Member only

Physical Security for Today’s Data Centers
Data center managers, faced with an increasingly stringent regulatory environment, need to rely on the latest technology and the industry’s best practices …
Utilities Cyber Threat Legislation on the Rise
Operational systems like SCADA and DCS [1] that control plants, refineries of all sorts and the flow of electricity in power grids, are now interconnected …
Identity control online
As technology improves, establishing who’s who, especially online and through non-traditional identification methods, is becoming increasingly difficult.
Perfect your password
Too many people are disregarding the security risks of using simple passwords online. But, in trying to avoid the hassle of creating strong passwords, …
Encryption basics
If you work with any kind of private data, it is good to acquaint yourself with encryption and a growing number of requirements to protect sensitive data.
Where did your data go?
A civilian employee of a police department disables warehouse security cameras and steals backup tapes putting identity numbers and the direct-deposit …
Protecting the privacy of others
With every action you take in our wired world, whether making an Internet purchase or posting a blog, you leave a digital footprint, a record of who you …
Watch your (digital) step!
Maybe you cover your PIN number when you enter it into an ATM. Perhaps you change and strengthen your computer passwords often. You may even refrain from …
Weighing the hacking risks
It’s a story that seems worthy of front-page headlines: A hacker exposes a major flaw in the protocol that underlies many of the world’s access …
Alliances frail but worthwhile
There are three ways to generate growth in a company: organic growth, mergers and acquisitions, and alliances. But beware – partnering is harder …
Separate worlds come together
A combination of security and IT knowledge will be crucial for succeeding in tomorrow’s security market. A recent study identifies some pitfalls …