Get Our Email Newsletter

Tag: security devices

data security best practices, physical security threats and vulnerabilities

Are Your Solution Providers Following Data Security Best Practices?

There may be no better symbol of the nation’s modern, high-tech military as its fleet of predator drones. So it surely caused a few red faces at the Pentagon when it was discovered that insurgents in Afghanistan and Iraq had used $26 software to intercept live video feeds from the unmanned planes.

Genetec Showcases Unified Security, Intelligence and Operations Solutions at GSX 2018

At GSX 2018 at Booth #2951, Genetec will demonstrate how true unification enables organizations to deploy a single platform that enhances situational awareness, streamlines...
electronic security

6 Essential Elements for Effective Electronic Security

Loss prevention directors need to call on many skills—not just their security smarts—to make a new or upgraded system optimally effective.

Johnson Controls Offers Dual Iris Capture with Iris ID Iris Access iCAM 7S and...

Johnson Controls has recently introduced the Iris ID® IrisAccess® iCAM 7S Series multifactor biometric readers, reportedly offering improved performance and easy integration with Software...
cargo crime

In-Transit Cargo Crime Risks and Repercussions

Envision the following scenario. You are at home around 8:15 at night watching television with your wife or kids when the phone rings. The...
- Sponsor -
- Sponsor -

Stay Updated

Get critical infromation for loss prevention professionals, security and retail management delivered right to your inbox.

Loss Prevention Media Logo

Stay up-to-date with our free email newsletter

The trusted newsletter for loss prevention professionals, security and retail management. Get the latest news, best practices, technology updates, management tips, career opportunities and more.

No, thank you.

View our privacy policy.