Vote, with No Confidence
The voting machines that almost derailed the Oct. 7 California recall election are all being replaced. But controversy over voting technology is far from finished
The voting machines that almost derailed the Oct. 7 California recall election are all being replaced. But controversy over voting technology is far from finished
To give companies a jump-start on computer security education, the Information Technology Association of America and survey firm Brainbench created in June a certification program
Where are the weak spots in your organization’s security perimeter? Is there a black market in your company’s access key-cards? Is your backup data center
In effect, Pat Gambaro began planning for this day in 1993.This month he is coming home, to new offices with a state-of-the-art trading floor for
Major U.S. ports, such as the Port of Oakland, are complex transportation systems that serve everything from recreational boats, to passenger ferries, to cruise ships,
Traditional video-security systems are known as closed-circuit television (CCTV) for a good reason: These workhorses of perimeter security typically use dedicated coaxial cable to carry
A “standard” shipping container is 8 feet wide, 8.5 feet high and 20 feet long. It can hold as much as 19 tons of soft
States vs. Cyberterror:Where is it a Crime?If information security used to be about preventing teenage hackers from breaking into corporate networks, 9/11 changed that. Since
Dean Barrett is piggybacking on a $13 million energy-saving program to install access control and fire monitoring systems at the Kansas City Convention and Entertainment