Top Stories


Democratizing Access

Democratizing Access

The COVID-19 pandemic has put financial institutions under more pressure to stay on top of fraudulent activity— as opportunists are looking for any weakness in a system that can be exploited.

The Rise and Sophistication of Mobile Apps in Physical Security Sector

Safety and security risks are everywhere including the office, schools, concerts, retail malls and hospitals. However, security professionals, who are tasked with protecting the public, can’t be everywhere at all times and they require timely information in order to prevent potential incidents.

Coordinating Emergency Communications

Coordinating Emergency Communications

One of the many lessons learned from the Smart Cities movement is that you can achieve significant improvement in community safety and resilience when you use network technologies to facilitate communications and data sharing.

Why Lone Workers are Vulnerable

The economic slowdown created by the pandemic has forced many retail chains, restaurants, hotels, banks and financial institutions with a retail presence to cut back on staff and change their business models.

The New Heart of Security

The physical security industry has before it an incredible opportunity: to lead business digital transformation (DX) through security convergence.

The Threat from Within

The Threat from Within

Just as banks use every tool at their disposal to maximize revenue opportunities and manage their ledger, they must take the same approach when it comes to security.

Controlling the Cogeneration Plant for Hudson Yards

Towering over the Hudson River on Manhattan’s New West Side is Hudson Yards – a cultural epicenter with more than 100 diverse shops, residences and culinary experiences. By area, it’s the largest private real estate development in the United States – covering more than 18 million square feet over seven city blocks.

Turning to technology as safe and trustworthy passwords

More Secure Banking

To be successful in financial services, banks, investment firms and other institutions need to prove to their customer base that they are safe and trustworthy. Yet many still rely on passwords, PINs and other knowledge- based authentication factors—which are not only unreliable, but also insecure.



A Hands-free Environment

No one will argue that the COVID-19 pandemic has dramatically changed the way we interact in public spaces.

Using AI Power

Using AI Power

Video surveillance is commonplace today, but many organizations don’t even realize that they aren’t fully leveraging the video data that their cameras capture. Traditionally, law enforcement and physical security teams use video cameras to monitor areas in real-time and to review footage to glean evidence for post-incident investigation.

The Evolution of Risk

Risk prevention has always been a fundamental part of business planning and operations. And while the various forms of protection available have evolved over the years, so also has risk. About 20 years ago, professional security was mostly limited to night watchmen, armored trucks and closed circuit video cameras wired to VCRs.

Encrypt Your Flash Drive

Encrypt Your Flash Drive

USB drives are convenient devices. They are used daily by hundreds of millions of people around the world to store or transport data, much of which would be considered confidential. Chances are there are plenty of USB drives floating around your company or organization right now.

How Security and COVID-19 Became Partners

COVID-19 has changed a lot of things about life and business Some opportunities have been challenging, other plans have been nimble exercises of security technology stepping up to the place, swinging for a home run.

Speco Continues To Expand the National Accounts Team with West Coast New Hire

Speco is pleased to announce the hiring of security Industry veteran Steven Currens as the latest addition to the National Accounts Team.

Eagle Eye Networks and Delaget launch new video and operational data integration for restaurant loss prevention

Eagle Eye Networks has announced a collaboration with Delaget, a software-as-a-service provider specializing in business intelligence for restaurants, to integrate the Eagle Eye Video API Platform into Delaget's loss prevention and analytical tools.

ISC East 2020 Has Been Canceled.

ISC East 2020 Has Been Canceled.

ISC East 2020, scheduled for Nov. 18-19, 2020, in New York City, has been canceled due to the ongoing impact of COVID-19 as further discussed below, and continued restrictions on large events.

PureTech Systems Awarded Contract to Protect Additional Power Generation Sites with PureActiv®

PureActiv software to provide wide-area intrusion detection with multi-sensor technology

Alcatraz Partners With SAGE Integration to Expand Modern Access Control Solutions Along the East Coast, Midwest

Alcatraz has partnered with SAGE Integration to deliver facial authentication solutions to enterprise businesses to help modernize access control.

Paxton COVID secure Tutorials and Resources Launched on Demand

Paxton is pleased to announce that their free COVID-secure live webinars are now available on demand - they can be watched anywhere, anytime at your convenience.

Interface Security Systems Makes Virtual Security Guard Monitoring Affordable to Businesses of all Sizes

Interface Security Systems has announced it is expanding its Interactive Remote Video Monitoring services with a new highly-affordable Virtual Security Guard Monitoring package designed specifically for small and mid-sized businesses (SMBs) and enterprises with moderate security challenges.

Eagle Eye Networks, Delaget Launch New Video and Operational Data Integration for Restaurant Loss Prevention

Eagle Eye Networks has announced a collaboration with Delaget, a software-as-a-service provider specializing in business intelligence for restaurants, to integrate the Eagle Eye Video API Platform into Delaget’s loss prevention and analytical tools.

AF Looks to Facial Recognition to Secure Facilities

AF Looks to Facial Recognition to Secure Facilities

The Air Force’s AFWERX innovation arm is investing in real-time facial recognition to secure base perimeters and enhance situational awareness for Air Force security staff.

Arcules Honored with Benchmark Innovation Award for Hybrid VMS Solution with Technology Partner Milestone Systems

Arcules has announced today that the Arcules-XProtect Hybrid VMS Solution has been selected as the winner in the Service-based Solutions category of the 2020 Benchmark Innovation awards.

Dunbar Security Solutions Acquires Manned Security Assets from Trust Security Services Inc.

Dunbar Security Solutions has finalized a deal to acquire assets from Trust Security Services, Inc. to provide manned security services in Washington, D.C.

Air Force One Nearly Hit by Drone

Air Force One Nearly Hit by Drone

As Air Force One was descending to an air base near Washington, D.C. recently, it nearly collided with a small drone, according to several people on board the aircraft. President Trump was aboard the modified Boeing Co. 757 aircraft.

Interagency Issues Advisory on Use of Technology to Detect and Mitigate Unmanned Aircraft Systems

The Advisory has been issued at a time when the commercial demand for UAS detection and mitigation is high, but the authority to use those capabilities is far from clear.

Passengers Left More Than $900,000 Behind at TSA Security Checkpoints

Passengers Left More Than $900,000 Behind at TSA Security Checkpoints

The Transportation Security Administration collected $926,030.44 in unclaimed money that passengers left behind at airport security checkpoints during fiscal 2019, including $18,899.09 in foreign currency.

ICE Homeland Security Investigations Nabs Smuggled Counterfeit Goods

On July 15, 2020, Hang “Henry” Chen, an employee of CBK, CBK International, and Silicon Electronics, was sentenced by U.S. District Judge James Donato to four months incarceration with three-years supervised release, a $75,000 fine, and restitution up to $137,000.

BriefCam Appoints Gil Briman as CEO

Veteran executive to lead company’s next phase of growth and innovation

Featured

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

  • Father of Georgia School Shooting Suspect Charged in Connection With Attack

    Colin Gray, the father of the 14-year-old Georgia school shooting suspect, has also been charged in connection with the attack. The 54-year-old father was charged with four counts of involuntary manslaughter, two counts of second-degree murder and eight counts of cruelty to children. More charges are expected. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3