Top Stories


Property Crime Down

If cyber crime and identity theft isn't taken into consideration.

Aspirating Smoke Detection Application Guide

Available for download from System Sensor and includes detailed application guidelines, codes/standards and more.

Google Removes ‘How Can I Join ISIS’ Autosuggestion

Google Removes 'How Can I Join ISIS' Autosuggestion

The search phrase was giving people advice for joining the radical group.

TSA Reports Record-setting Number of Firearms Found at Airports

TSA Reports Record-setting Number of Firearms Found at Airports

Thousands discovered with the majority of them loaded.

Genetec at ISC West 2015

Showcasing upcoming release of Security Center, new SIP-based Communications Module and Hybrid Cloud Archiving Service.

Honeywell Welcomes Symon Systems as Authorized Dealer

Firm provides security and access control to customers in Northern Florida.

Denmark Outlines Security Funding after Terror Attacks

Denmark Outlines Security Funding after Terror Attacks

The government is also looking to prevent young people from becoming radicalized.

Razberi Technologies' Growth Prompts Move to Larger Headquarters

Innovative Razberi ServerSwitch manufacturer triples their office, production and storage space.



Report Claims U.S. Embedded Spyware Overseas

Report Claims U.S. Embedded Spyware Overseas

The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.

U.S. Allies and Friendly Nations Can Purchase Drones from the Government

U.S. Allies and Friendly Nations Can Purchase Drones from the Government

Drone strikes integral part of global warfare.

Intercede's MyTAM Enables Enhanced Trust for Android Apps

Cloud-based service loads applications into the cryptographically-secured Trusted Execution Environment, embedded in the majority of leading Android smartphones.

ISCON Imaging Introduces New Whole-body and Handheld Imaging Products

FocusScan offers IR-based, handheld imaging technology while SecureScan is a whole-body scanner.

RBtec Seismo Buried Unattended Ground Sensors Kits

New buried sensor solution for underground perimeter security.

SecurityTronix Reveals Latest IP Video Test Monitor with Image Display

ST-IP-TEST designed to maintain and make installation of IP and analog cameras easier.

G4S Kazakhstan on Oil Theft Prevention in the Country

Exclusive interview for the 2nd CACOGS Forum to be held by IRN, 3rd-4th March, Ritz Carlton, Almaty.

LILIN Introduces 5 Megapixel 360° Panoramic Dome IP Camera

New camera has anti-vibration M12 Ethernet connector for installation on subway cars, buses, trains and emergency vehicles.

Honeywell Welcomes Apex Investigation and Security Inc. as Authorized Dealer

Recognized, family-owned business provides wide range of security technologies.

Billion Dollar Cyberheist Caused By Phish-prone Employees

KnowBe4 urges US institutions to take effective action to train employees before they fall victim to phishing attacks.

L-3 Security & Detection Systems Receives Order from German Ministry of the Interior

Airports install 100 ProVision ATD and ProVision 2 security scanners for primary screening.

Milestone Certifies BCDVideo Nova Series on XProtect

Certified video surveillance storage system among “best ever tested."

Video Footage May Prove Unethical Behavior on Tradeshow Floor

Video Footage May Prove Unethical Behavior on Tradeshow Floor

LG accused of damaging four Samsung Crystal Blue washing machines in Berlin.

U.S. Sees Major Q4 Spikes in Cargo Thefts

U.S. Sees Major Q4 Spikes in Cargo Thefts

Highlighting the hotsheet.

Security Guard Killed inside Marijuana Dispensary

Security Guard Killed inside Marijuana Dispensary

The guard was shot and killed during an attempted robbery.

The Bradford City Fire Disaster

The Bradford City Fire Disaster

UK steel glazing company has supplied fire-rated systems to several Olympic, FIFA and other major stadiums.

Obama Recruiting Tech Companies for Cybersecurity

Obama Recruiting Tech Companies for Cybersecurity

Executive actions aim to increase information sharing among private sector companies and federal law enforcement.

Samsung SmartTVs May Record Conversations

Samsung SmartTVs May Record Conversations

A line in the privacy policy states the television may record conversation and send it to a third party.

Axis Unanimously Accepts Bid from Canon

Canon Inc. has announced a public offer to the shareholders of Axis to transfer all of their shares in Axis to Canon. The total value of the offer is SEK 23.6 billion

New Report Finds Security Gaps in Vehicle Technology

New Report Finds Security Gaps in Vehicle Technology

A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.

Featured

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3