by Liquid Video Technologies | Sep 20, 2019 | Access Control, Business, Home Security, Security, Security Cameras, Video Surveillance
Years ago, installing a new surveillance system often meant finding a comfortable trade-off between improved security and the amount of hardware you were willing to look at on a daily basis. Most security cameras were large, bulky devices, and few options existed for...
by Liquid Video Technologies | Jul 31, 2019 | Access Control, Home Protection, Home Security, Security, Security Cameras, Video Surveillance
Ecommerce retailers face many challenges as consumers become more dependent on the convenience of online purchasing. Beyond the mere logistical challenge of effectively managing an e-commerce transaction, retailers are also challenged with the increased number of...
by Liquid Video Technologies | Jul 8, 2019 | Access Control, Burglar Alarms, Business, Home Monitoring, Home Protection, Home Security, News, Security, Security Cameras, Video Surveillance
Video Surveillance and the Evolving Needs of the End-User: Update, Integrate, Analyze, Act Video surveillance has long been a critical component of facility management and security plans, and it is only expected to grow. Being able to use this video surveillance...
by Liquid Video Technologies | May 21, 2019 | Computer Networking, Cybersecurity, Data Breaches, Drone Technology, Home Security, Network Security, People That Make A Difference, Security Breach, Technology News, Websites
DHS warns of Chinese-made drones stealing sensitive data Drones contain components that can steal sensitive data and share on a server accessed beyond the company itself. An industry analysis has revealed that nearly 80% of the drones used in the US and Canada are...
by Liquid Video Technologies | Apr 23, 2019 | Computer Networking, Cybersecurity, Data Breaches, Deterrent Tactics and Devices, Home Security, Https, Network Security, Networking, News, PCI Breach, PCI Compliance, People That Make A Difference, Security, Security Breach, Technology News, Websites
Microsoft Office now the most targeted platform, as browser security improves Microsoft Office has become cybercriminals’ preferred platform when carrying out attacks, and the number of incidents keeps increasing, Kaspersky Lab researchers said during the company’s...
by Deveren Werne | Apr 13, 2019 | Cloud-Based Access Control, Computer Networking, Cybersecurity, Data Breaches, Home Security, Network Security, Networking, People That Make A Difference, Security, Smart Home, Technology News, Websites
Spy on your smart home with this open source research tool Researchers at Princeton University have built a web app that lets you (and them) spy on your smart home devices to see what they’re up to. The open source tool, called IoT Inspector, is available for...
Recent Comments