Top Stories


huawei

Huawei Has Another 90 Days To Do Business With American Companies

The Trump administration has granted a 90-day extension for American firms to find alternatives to the Chinese telecommunications corporation.

amazon skyscraper

Amazon’s Facial Recognition Software Can Now Detect Fear, Company Says

Rekognition could already detect “happy,” “sad,” and other emotions. Now, the software is capable of analyzing people’s faces for fear.

texas capitol building

Ransomware Attacks Hit 23 Texas Towns, Prompting Statewide Response

The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”

open source vulnerability hacking

The Dangers of Open-Source Vulnerabilities, and What You Can Do About It

Neglecting basic security practices exposes companies to long-standing security threats.

vegas strip

Las Vegas Tests Cameras, Sensors To Measure Collision Patterns on One-Way Streets

The city partnered with Dell, NTT and the Nevada state government for a year-long pilot program to help reduce vehicle accidents.

Paxton Welcomes New Senior Product Manager

Jeremy Allison will be working to develop Paxton’s leading brands Net2, Net2 Entry and PaxLock

capital one building

Alleged Capital One Hacker Stole From More Than 30 Other Organizations, Prosecutors Say

In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.

Philadelphia police logo

Standoff With Gunman In Philadelphia Ends With Six Police Officers Shot

After six officers suffered non-life threatening injuries, the city’s mayor is calling for tougher gun control policies to help law enforcement keep firearms out of the wrong hands.



passport at airport

Customs and Border Protection Lays Out Plans to Expand Use of Facial Recognition Technology

The agency is looking for contractors that would “transform” its passenger processing systems and integrate facial recognition into “all passenger applications.”

fingerprint entrance technology

Security Company Exposes Fingerprint, Facial Recognition Data of Over 1 Million Users

Suprema, which operates the Biostar 2 biometric smart lock system, leaked over 27.8 million records in a publicly accessible database discovered by security researchers.

Allied Universal Ranks #1,619 on Inc. Mag's List of America's Fastest Growing Private Companies

Leading Security Services Company Makes the 2019 List with a Three-Year Revenue Growth of 255 Percent

London Theatres Outfit Staff With Body Cameras to Handle Rowdy Attendees

London Theatres Outfit Staff With Body Cameras to Handle Rowdy Attendees

After experiencing a rise in aggressive behavior from guests, theatres in London’s West End are using body cameras to deter audience members from being abusive toward staff.

San Diego Police Expand Use of Streetlamp Camera System To Catch Violent Criminals

San Diego Police Expand Use of Streetlamp Camera System To Catch Violent Criminals

The department has used video footage from the 3,200-camera system in over 140 cases in the past year, calling the program “game changing.”

IDIS Camera

Nonprofit Emily's Place Is The First Beneficiary Of The IDIS "Create A Better World" Effort

IDIS America’s donation of technology from its next-generation video surveillance Total Solution supports the facility’s efforts to provide a safe environment for those looking to escape domestic abuse and transform their lives

Sargent and Greenleaf Announce Palmer's Security Solutions As Its Authorized Global Service Center

As a primary element to this partnership, PSS will also provide technical training to S&G’s customers for S&G 2890B pedestrian door lock, and S&G’s government approved combination lock, S&G 2740B.

Massachusetts Nurses Push For Law To Protect Them From Patient Violence

Massachusetts Nurses Push For Law To Protect Them From Patient Violence

The proposed measure would require hospitals and other employers to implement workplace violence prevention programs.

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.

St. Louis County Police Department To Become Largest In Missouri With Mandatory Body Cameras

St. Louis County Police Department To Become Largest In Missouri With Mandatory Body Cameras

By April, the county police department will outfit nearly 700 officers with cameras. But the city’s department of 1,300 does not have a parallel program in the works.

secure tablet

How Deception Technology Can Help You Detect Threats Early

Deploying automated decoys can help protect your network and reduce IT costs.

How The Restaurant Industry Is Handling Renewed Active Shooter Threats

How The Restaurant Industry Is Handling Renewed Active Shooter Threats

More companies are rethinking their active shooter training programs and evaluating the financial risk of shootings at their locations.

State and County Fairs Increase Security Measures in Wake of Mass Shootings

State and County Fairs Increase Security Measures in Wake of Mass Shootings

Fair organizers in New York, Los Angeles and Wisconsin are responding to safety concerns with assurances that their events are well-protected.

Rebuilding Trust After Cybersecurity Lapses

Rebuilding Trust After Cybersecurity Lapses

Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.

MOBOTIX Obtains the CNPP Trust Passport For Video Surveillance Cameras

MOBOTIX is first manufacturer in Europe to obtain the French “CNPP certified” product certification for its cameras.

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.

wifi router office

IoT Security: Current Threats and How to Overcome Them

Connecting devices to a 0G network is a simple fix to seemingly insurmountable challenges.

DHS Warns of ‘Tragedy-Related Scams’ After El Paso and Dayton Shootings

DHS Warns of ‘Tragedy-Related Scams’ After El Paso and Dayton Shootings

A Homeland Security agency and the FBI’s El Paso office are cautioning Americans to watch out for malicious "charity" emails and phone call scams.

cisco systems

Cisco Agrees to Pay Over $8 Million For Selling Video Surveillance System with Technical Flaws

Experts believe Cisco’s payout to a whistleblower could set a precedent for future lawsuits against vendors who sell products with security vulnerabilities.

Pelco Provides Meaningful Cybersecurity

At the Cyber:Secured Forum in Dallas, two Pelco employees broke down the "culture shift" from physical to cyber issues in the security industry.

el paso police

Two Mass Shootings in El Paso and Dayton Claim Over 30 Lives In Less Than 24 Hours

Communities are calling for legislative action, particularly after it was revealed that one shooting was motivated by white supremacist ideology.

Resideo Names Bob Appleby Vice President and General Manager of ADI North America

In his new role, Appleby will oversee all of ADI North America’s business operations across the United States, Canada and Puerto Rico

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3