California man caught wearing only women’s lingerie during home break-in

A California man who allegedly broke into someone’s home – while dressed in only women’s underwear – before fleeing the scene has been taken into custody, investigators said Shaun McGuire, 37, was arrested on Saturday after the bizarre ordeal in El Dorado Hills A family woke up in the middle of the night to find McGuire dressed in lingerie. TEXAS…

960H CCTV Security DVR Demo – iDVR-PRO

In this video I’ll introduce the new user interface for the iDVR-PRO 960H model surveillance DVRs. The new user interface is super easy to navigate whether you’re using the USB mouse or wireless remote control that is included with the DVR. I personally prefer using the mouse. The user interface that you will see is…

How to Protect Your Kidney Health: Avoid These 5 Foods

These 5 foods are full of ingredients, additives and chemicals shown to cause the worst problems to your kidneys and overall health. If you want to protect your kidney health, keep these 5 supermarket staples out of your shopping cart. Hello and welcome, this is Katherine from 00Kidney. Like your doctor may have told you,…

Home Security Reviews: Vulnerability of the Phone

Welcome to the FrontPoint Podcast series, I’m your host Greg Able joined today by FrontPoint’s Chief Operating Officer Peter Rogers. Hi Greg. Hi Peter. Thanks for taking the time and today we’re going to talk about something of a hidden secret in the home security industry. Something some of the big players don’t always tell…

Total Data Protection with IBM Security Guardium

Stopping cybercriminals starts with thinking like them. After all, they think like you. You may not be the only one accessing the sensitive information in your data sources. Hackers and malicious insiders know data security and compliance are real challenges for organizations with diverse environments, sensitive data scattered across databases, big data and cloud environments,…

Early look at Microsoft Threat Protection

– Coming up, we’re joined by Security CVP Rob Lefferts to take a look at Microsoft Threat Protection that harnesses trillions of threat signals from the Microsoft Intelligent Security graph to secure your workplace. We’re gonna show you how you can get a unified single consul, to get visibility of security threats across your identities,…

What ACTUALLY Happens in Witness Protection

Seven suitcases and 2 hours, that’s all your family has. Your favorite rock band t-shirt. That stuffed bear you won at a carnival long ago. You can keep those. The baseball jersey you had on when you hit the game winning homerun, you can’t take it with you. It has your last name stitched across…