Top Stories


Why a Cloud First Strategy Leaves the Door Open to Hackers

Why a Cloud First Strategy Leaves the Door Open to Hackers

Kicking off a cloud-first strategy without considering security measures can cloud your judgement

How AI Can Deliver a Safer Future

How AI Can Deliver a Safer Future

The ability of the latest developments in deep learning and neural networks to detect suspicious behaviour looks set to revolutionize security and law

CBP Turns Away Ukraine and Lithuanian Travelers at PIT Airport for Violating US Immigration Laws

CBP Turns Away Ukraine and Lithuanian Travelers at PIT Airport for Violating US Immigration Laws

CBP urges all international visitors to ensure they possess the appropriate U.S. travel visa for the purpose of their visit

DHS to Strengthened Northern Border Strategy

DHS to Strengthen Northern Border Strategy

The strategy establishes a clear vision and concrete actions that will improve DHS’s efforts to safeguard our northern border against terrorist and criminal threats

Homeland Security Launches Training For Countering Terrorists Exploitation of Social Media

Homeland Security Launches Training For Countering Terrorists Exploitation of Social Media

This online 90-minute training is designed to educate startup companies and social media companies about how terrorists may seek to exploit their platforms.

Police Are Training Canines to Sniff Out Electronics

Police Are Training Canines to Sniff Out Electronics

Strong nosed K-9s help police sniff out electronics.



Government Presents Federal Policy

Federal Policy, Technology Standards for Shaping Secure Identity and Access

The impact of updates to policy and specifications for the expanded use of standards-based technologies on securing identity and access in government was a leading theme throughout the two-day event.

Albuquerque Increasing Security at City Parks

Albuquerque Increasing Security at City Parks

The city council approved $114,000 for security cameras to be installed at the parks and an additional $100,000 for park security

University of Central Florida Modernizes IT Infrastructure

Campus Achieves Comprehensive Data Protection and Centralized Management for Entire Security and Surveillance Ecosystem with Pivot3 and Milestone Systems

Do You Know Where Your Data Is?

Do You Know Where Your Data Is?

Educational institutions are a data treasure trove.

Drones Using AI to Spot Violent Behavior in Crowds

Drones Using AI to Spot Violent Behavior in Crowds

Researchers are pairing artificial intelligence and drones in the latest experiment to prevent crimes before they happen.

Your cameras were hacked? It’s YOUR fault!

Your cameras were hacked? It’s YOUR fault!

IP security cameras are connected to the internet. That's what allows users to access them remotely, to check in on their business, and what lets manufacturers update device software without having to physically visit their business.

How to Ensure You Have a Safe and Efficient Farm

How to Ensure You Have a Safe and Efficient Farm

Installing alarms, safety training and fencing could be the difference in a secure farm.

Marshall County to Upgrade School Security before Next School Year

Marshall County to Upgrade School Security before Next School Year

Four months after two students died in a shooting on campus, the district is layering security measures to keep students safe.

Apple to Focus on Privacy and Security in iOS 12

Apple to Focus on Privacy and Security in iOS 12

Apple has announced new settings to strengthen security on your mobile, laptop and tablet devices.

Facial Recognition to Aid in Border Security this Summer

Facial Recognition to Aid in Border Security this Summer

The Vehicle Face System is planned for testing in August at the Anzalduaz Port of Entry in Texas.

Pentagon to Conduct All Federal Security Checks

Pentagon to Conduct All Federal Security Checks

Pentagon officials said that over the next three years it will be responsible for background investigations for military and civilian employees and contractors.

A Third of Companies Would Consider Paying Hackers

A Third of Companies Would Consider Paying Hackers

Several companies are opting for short-term reactive cybersecurity despite high profile ransomeware attacks.

House of Representatives Passes Bill Banning Government use of Chinese Surveillance Gear

House of Representatives Passes Bill Banning Government Use of Chinese Surveillance Gear

The $717 billion defense-policy bill is the latest move against Chinese technology on the basis of national security concerns.

Don’t Be Caught Unsecured

Don’t Be Caught Unsecured

Over the last decade, the cloud has revolutionized the way businesses operate. Today, modern enterprises are turning to a hybrid IT environment, leveraging the best of both worlds—the scalability of cloud infrastructure and the control of on-premises systems.

The Head Count

The Head Count

While students focus on learning, Putnam City Schools Police Department works hard to keep everyone safe. Officers monitor schools 24/7 and also spend a lot of time conducting investigations and compiling digital evidence for cases. Often, this involves working closely with local agencies to help keep their communities safe.

Video Grand Slam

Video Grand Slam

The Great American Ball Park in Cincinnati is the hallmark of America’s greatest pastime and home to baseball’s oldest franchise, the Cincinnati Reds. In addition to new food and entertainment options, providing high-end visual technology was a large priority—delivering a bevy of video walls, projectors, interactive screens, and flat screens that would entertain fans in and out of their seats for the ultimate game day.

Catching the Cybersecurity Wave

A few months ago I attended a security event in Atlanta that was primarily focused on cybersecurity and learned a number of things to share.

Out of Harm’s Way

With more than 21,000 individual artworks on display at any given time, the Butler Institute of American Art sought out a security system to assist the guards in monitoring the vast amount of rooms and corridors filled with priceless works.

Stopping Tragedy in its Tracks

Event organizers have responded to past attacks by improving their security methods and adding more metal detectors, police and other security personnel. Despite these efforts, a would-be terrorist can still manage their way to the venue’s entrance and pose a mass casualty threat.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3