Top Stories


Indianapolis City Officials Initiate Study for Body-Worn Cameras

Indianapolis City Officials Initiate Study for Body-Worn Cameras

Indianapolis seeks feedback form the community, officers in newly launched study on body-worn cameras.

Securing the State of the Union Address

Securing the State of the Union Address

Several agencies work together to create a comprehensive security plan to protect the State of the Union.

Airbus Suffers Hack Attack, Discloses Breach

Airbus Suffers Hack Attack, Discloses Breach

Airbus has disclosed the company is the victim of a cyberattack.

San Francisco Looking to Ban Facial Recognition Tech

San Francisco Looking to Ban Facial Recognition Tech

A proposed ban in San Francisco has introduced a series of rules that could dramatically limit enhanced surveillance.

Connecticut City Looks to Use Retired Detectives as Security for Apartments

Connecticut City Looks to Use Retired Detectives as Security for Apartments

Problems at a downtown apartment building leads to discussions on hiring retired officers to keep the peace.

Advancing on Two Fronts

The way that smart cards are issued has changed dramatically in the last several years with the advent of cloud-based systems that enable the entire process to be managed and executed remotely, and with printer/encoder breakthroughs that significantly boost throughput, reliability and energy efficiency.

A Profile in Partnership

A Profile in Partnership

Microwave sensors, also known as Radar, RF or Doppler sensors, detect walking, running or crawling human targets in outdoor environments.

Cabling our Government

Cabling our Government

The government commands a lot of information in data centers, local municipalities, homeland security, health, and every touch that governments have with private citizens and companies. The data can be classified, private and public-facing as in forms.



Unlocking the Benefits

Unlocking the Benefits

The Internet of Things (IoT) promises greater connectivity, which, when properly leveraged, can provide invaluable insight into our organizations and our operational environments. In the security sector, increased connectivity between sensors and systems gives us access to more data than we thought possible even just a few years ago.

High Profile Security

As with any high-profile entertainment complex that draws more than one million visitors every year, the stadium faces complex and constantly evolving security challenges.

Deploying a Cloud Strategy

Deploying a Cloud Strategy

There’s enormous opportunity for all enterprises in the cloud, and those in the middle market are taking note.

The Next Wave

The Next Wave

Originally designed as consumer devices, smartphones have become vital elements of both our personal and professional lives. Unfortunately, as sources and repositories of our most sensitive data, smartphones have quickly become a primary attack surface for hackers, cybercriminals and foreign spies.

Crimes on Campus

Crimes on Campus

College and university campuses aren’t immune from the same types of crime, such as burglary and assault, found in any small city where thousands of people live and work closely together. Yet overall, campuses remain a mostly safe place for young adults to learn and mature.

Defending Against Attack

When Paramount Studios, the longest operating and only remaining studio in Hollywood, wanted a preventative solution that would protect tourists and talent from car attacks, they contacted Perimeter Security Group, an integrator that has become one of the leading providers of perimeter security systems in the country.

The Long Reach of Government Security

The government has its fingers in everything, and it is necessary when you think about managing the nation’s infrastructure. Think carefully about securing the nation’s transportation system.

Church Should Be Off Limits

While attending religious services during the holiday season, a local congregant asked me if I had heard about the ISIS threat to local houses of worship in East Texas. I was not aware, but I started digging.

A Slam Dunk

A Slam Dunk

With all this plus four lobbies and multiple entry points, security at American Airlines Center is a 24/7 responsibility. Finding the right camera system for such a diverse environment presented a challenge.

Introducing Kessel Run to DOD

Everyone wants a piece of Kessel Run, the Air Force’s agile software development program, and attempts to replicate its success of are already underway.

Adding Sound and Safety

Adding Sound and Safety

At JFK Airport, immigration officers process hundreds of international passengers per flight. With the continual influx of people combined with limited staffing, law enforcement personnel are increasingly looking for technologies to enhance their efforts to deter illegal entry or trafficking and aid in crime investigation.

More Than a Set of Eyes

More Than a Set of Eyes

The technology behind today’s optical sensors and lenses has come a long way in trying to mimic some of the hallmark characteristics of the human visual system.

Japan to Check 200 Million Devices for Cybersecurity Risks

Japan to Check 200 Million Devices for Cybersecurity Risks

As part of the preparations for next year’s summer Olympics in Tokyo, Japan’s National Institute of Information and Communications Technology will check about 200 million internet-connected devices for potential cybersecurity vulnerabilities.

Philadelphia City Hall Adds Security Measures

Philadelphia City Hall Adds Security Measures

Philadelphia City Hall installed an X-ray machine and metal detector at its entrance during the holidays, according to KYW Newsradio 1060.

Massachusetts Library Hires Retired Police to Patrol

Massachusetts Library Hires Retired Police to Patrol

Trustees’ spokesperson Tracy Davis said that at least one officer will be on duty during all times the library is open to the public. Davis said that the security schedules are coordinated to provide officer coverage for all 59 ½ hours of the library’s weekly schedule.

Courts Biometrics Ruling Poses Risk to Technology Companies

Court's Biometrics Ruling Poses Risk to Technology Companies

The Supreme Court of Illinois ruled Six Flags Great America collected a boy's thumbprint without proper consent.

Apple Disables Group FaceTime Following Reports of a Security Flaw that Allowed Eavesdropping

Apple Disables Group FaceTime Following Reports of a Security Flaw that Allowed Eavesdropping

A glitch in Apple's FaceTime app let users hear—and see—the other person even if the recipient never accepted the call.

Pivot3 Achieves Advanced Certification of Its Intelligent Infrastructure Solutions for Genetec Unified Security Platform

Hyperconverged infrastructure optimized with Genetec Security Center to enhance video capture in enterprise-class IoT and security environments

West Virginia City Considering Installation of New Security Cameras

West Virginia City Considering Installation of New Security Cameras

West Virginia city looks to install security cameras in places where power is limited.

Ohio County Plans to Increase Courthouse Security

Ohio County Plans to Increase Courthouse Security

Rural Ohio County works to increase security at courthouse.

Over 40 Agencies Provide Security for Super Bowl LIII in Atlanta

Over 40 Agencies Provide Security for Super Bowl LIII in Atlanta

A Joint Operations Center has been created for more efficient communication and security as fans defend on Atlanta for the annual Super Bowl game.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3