April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Commentary & Opinion

Teaneck, NJ, July 14 – Multi-factor authentication – a security protection required by US government standards – could have prevented the recent Internal Revenue Service (IRS) and Office of Personnel...
By Austin MartinIf you’ve ever wondered whether or not the Army is just like World of Warcraft, the answer is: kinda. It turns out that all branches of the military are experimenting with some...
By H. Wayne Duff, Jr.Critical infrastructure defines all the assets, systems and networks in place to store and safeguard information vital to national security in the United States. So vital, in...
By Omar Pinzón and Kenny OrocuWhen the Sixth Summit of the Americas concluded in April 2012, the Colombian president announced that the Seventh Summit of the Americas was to be held in Panama three...
By Ken WestinFederal Energy records show that the nation’s power grid is under some kind of physical or cyber attack nearly once every four days. Over the last few years the proportion of cyber...
By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of...
Washington, D.C., June 17 – No Labels leaders are participating in a series of signature events on and around Capitol Hill, on Wednesday, to make the case for its National Strategic Agenda as a...
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by...
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted...
By Walker White It’s becoming alarmingly common to learn that another retailer or national chain has fallen victim to a cyberattack. Anthem, Target, Home Depot, eBay, Domino’s Pizza and Neiman Marcus...

Pages

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...