Top Stories


Popular Social Media Platform is More Secure than State Department Emails

Popular Social Media Platform is More Secure than State Department Emails

Four U.S. senators are asking for enhanced security for email.

Patrol Wants Increased Security to Remain in North Dakota Capitol

Patrol Wants Increased Security to Remain in North Dakota Capitol

The North Dakota Highway Patrol wants to keep security measures the same following protests of the Dakota Access pipeline.

Security Flaw Discovered in Nearly All Macs and PCs

Security Flaw Discovered in Nearly All Macs and PCs

A new vulnerability brings back the risk of a cold boot attack.

New Hong Kong Airport Luggage Rules Create Security Risk

New Hong Kong Airport Luggage Rules Create Security Risk

Hong Kong Airport cabin crews believe new rules on luggage create unnecessary security risks.

How Security Cameras Helped King City Police Reduce Violence and Improve Safety

How Security Cameras Helped King City Police Reduce Violence and Improve Safety

As King City looks to transform itself from a point of contention in a violent gang war to a safe place to live and work, Hanwha cameras have played a key role in the city’s positive results so far.

DHS Releases Statement on Southwest Border Migration

DHS Releases Statement on Southwest Border Migration

The Department of Homeland Security has released the following statement on Southwest border migration, for August, according to the Customs and Border Protection.

Cyber Security Summit Coming to Global Security Exchange

ASIS International, the world's largest association of security management professionals, recently announced that Cyber Security Summit will co-locate with Global Security Exchange (GSX), expanding the depth of cyber education in the blockbuster GSX conference program

School Violence Through the Decades

School Violence Through the Decades

School shootings are not new. Campuses have been fighting to keep students safe for decades.



Users of Kodi Media Player Targeted by Cryptomining Malware

Users of Kodi Media Player Targeted by Cryptomining Malware

Third-party add-ons were found to contain malware targeting Windows and Linux users

Red Flag Law Seizes Guns from those Deemed Dangerous

Red Flag Law Seizes Guns from those Deemed Dangerous

The red flag law looks to curb gun violence following a string of school shootings.

Bradley D. Spacy and K.T. McFarland Announced for Global Security Exchange Keynote Lineup

ASIS International, the world's largest association for security management professionals, recently reported Air Force Major General Bradley D. Spacy and former Trump Administration Deputy National Security Advisor K.T. McFarland will join the keynote lineup for Global Security Exchange (GSX), the security industry's flagship event.

Six People Dead Following Shooting in California

Six People Dead Following Shooting in Bakersfield, California

A gunman in Bakersfield, Calif. killed his wife and four others before turning the gun on himself Thursday night.

Information Security: Three Industry Apps to Follow

Information Security: Three Industry Apps to Follow

InfoSec has become a hot-button issue.

California Casino Recruits Security Robots

California Casino Recruits Security Robots

The West Coast resort has added two ‘bots to the force, with at least one more planned.

Remembering 9/11

ABC Sydney Tightens Security Following Infiltration

ABC Sydney Tightens Security Following Infiltration

ABC is tightening security at its Sydney headquarters after a man infiltrated security and assaulted an employee.

Airports Increase Security for 9/11 Anniversary

Airports Increase Security for 9/11 Anniversary

Florida officials are boosting security at and around airports for the anniversary of the Sept. 11 attacks.

How to Keep Safe in Cyberspace

How to Keep Safe in Cyberspace

Major threats around the world impend through the internet at alarming rates.

Integrate to Improve Loss Prevention

Integrate to Improve Loss Prevention

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All of these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country.

Future Smartphone Payments to Rely on Software Security

Future Smartphone Payments to Rely on Software Security

Study finds the growth of smartphone payments will increase the use of biometric security measures on mobile devices.

Four Dead, Two Injured in Cincinnati Shooting

Four Dead, Two Injured in Cincinnati Shooting

Three victims are dead and at least two more have been injured in an active shooter situation that took place in downtown Cincinnati this morning.

IT Spending to Increase in 2019 Due to Focus on Security

IT Spending to Increase in 2019 Due to Focus on Security

Businesses will be allocating more funds to their IT sector next year, with most of the budget going to cybersecurity measures.

Seven Indispensable Cybersecurity Tips

Seven Indispensable Cybersecurity Tips

Cybersecurity is something everyone should be concerned about. Every business must work to protect sensitive data and personal privacy. Here are seven indispensable cybersecurity tips for any and everyone on the internet.

Bigger is Getting Better

Bigger is Getting Better

Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security.

Consider Data Security

Consider Data Security

Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.

Cyber and Security

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.

Opening New Opportunities

Opening New Opportunities

As demand for controlled access communities continues to grow, so does the demand for secure and flexible access solutions.

Transitioning from Video to Vision

In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.

Growing Adoption

One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3