Top Stories


Three Ways To Ruin A Security Director

Three Ways To Ruin A Security Director's Day

Whether your title is Security Director or you just have the responsibilities of one, there’s a lot riding on your shoulders.

Be Strong

Be Strong

Looking at examples of how municipalities or governments protect these assets can help businesses plan as well. Critical infrastructure for businesses often shares similar needs with municipalities: how do we best protect servers, structures and the people who live and work in private buildings?

Keeping Your House Secure

Keeping Your House Secure

Conversations about what can be done to keep violent weapons and dangerous materials from falling into the wrong hands continue to dominate the political discussion, leaving communities wondering about what they can do to prevent the next school or church attack.

Protecting Your Data

Protecting Your Data

Even if you don’t have a Facebook account, you have undoubtedly heard the reports about how Cambridge Analytica accessed the personally identifiable information (PII) of up to 87 million users over a period of several years.

Key Considerations

Key Considerations

Having both specific and shared goals is what makes medical centers quite unique to security. Rarely are two buildings alike, yet they all have common needs, requirements and goals.

Trusted Identities

Trusted Identities

As with all major sporting and entertainment events, the goal is for everyone using a ticket to have purchased it from the authorized ticketing entity and to have a seamless experience both when they pick it up and when they present it at the venue.

Integrate to Save

Integrate to Save

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT.

Layering Facility Security

Layering Facility Security

Today’s facility operators must prepare for virtually any event from vandalism to a terrorist attack. With facilities ranging in size and use—from an emergency communications center to a multi-family apartment building—there’s no readily available one-size-fits-all security plan.



Bollards at the Benz

Bollards at the Benz

While the threat of terrorists planning to attack soft targets, such as stadiums, increases, stadium security professionals must look for the weak points throughout their facilities to determine where fanatics are most likely to assail.

Swinging For The Fence

Swinging For The Fence

With more than 120 permanent network cameras in place at Volunteer Stadium and Howard J. Lamade Stadium, Little League International works to add new technologies each year to keep the installation as secure as possible

Red Hawk Buys SDT to Grow Presence in Philadelphia Region

Red Hawk Fire & Security, LLC. has announced the purchase of Security and Data Technologies, Inc., (SDT) to continue extending its reach to customers in Philadelphia, and the tri-state area of Eastern Pennsylvania, Central and Southern New Jersey and Delaware.

The New World We Live In

I’m old enough to remember fire alarm drills and hiding under my desk as a youth. The fire alarm drills were great because we were able to leave the classroom and go outside. I never understood hiding under the desk, but went along with it anyway. That’s the world I grew up in.

Comparing Wireless Communication Protocols

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

Clustering Attacks on Web Apps to Find the Real Story Behind the Headlines

Clustering Attacks on Web Apps to Find the Real Story Behind the Headlines

Our goal of clustering attacks on web applications is two-fold

Reducing Crime

Reducing Crime

With police departments often being under budgeted and over worked, resulting in reduced patrols and delayed response, many business owners have come to expect that valuable assets stored outdoors are going to be subject to theft and vandalism, and these costs just need to be absorbed.

Foxwoods Casino Upgrades Video Surveillance System

Foxwoods Casino Upgrades Video Surveillance System

As Foxwoods grew and expanded, so did the need for a state-of-theart, integrated video surveillance system to provide necessary coverage and security for the gaming facilities.

Going Global

Going Global

The new and growing interest in the technology sector has given rise to a new phenomenon known as “Tech tourism,” whereby tech companies have seen ever increasing numbers of visitors being attracted to their sites as tech enthusiasts undertake a kind of digital pilgrimage.

Moving From Mechanic to Electric

In 2017, the HUSD sought to upgrade existing mechanical locks to electronic locks. With more than 5,000 doors across 28 campuses districtwide, the transition was sure to be a significant undertaking.

Integrators are Product Savvy

It has become crystal clear to me that integrators and distributors are experts in product development in this industry.

On the Run

The modern workplace is increasingly mobile. The prevalence of secure mobile internet and emphasis on face-to-face collaboration has seen corporations increasingly emphasize remote work for their employees.

Arkansas PAnel Calls for Armed Presence at All Schools

Arkansas Panel Calls for Armed Presence at All Schools

Arkansas looks for ways to boost security on campuses.

21 Million Users Affected by Timehop Data Breach

21 Million Users Affected by Timehop Data Breach

Timehop disclosed a security breach that has compromised the personal data, including names and emails, of its 21 million users

Catholic Diocese of Fort Worth Shifts Focus to Security

Catholic Diocese of Fort Worth Shifts Focus to Security

Catholic churches in Fort Worth have removed signs banning guns, but that doesn't mean the policy has changed.

Smithsonian to Add Permanent Security Checkpoints at National Zoo

Smithsonian to Add Permanent Security Checkpoints at National Zoo

The National Zoo is the only Smithsonian public venue without security screening.

The Case for Deploying H.265 in Video Surveillance

The Case for Deploying H.265 in Video Surveillance

As the security industry continues to embrace 4K, Ultra HD and other high-resolution imaging formats with high bitrates, recording and storing surveillance video has become one of the main challenges facing end users and systems integrators.

How Your Organization Can Get Started with Information Security

How Your Organization Can Get Started with Information Security

Information Security it is one of the most in demand skill sets in all the technology industry.

San Diego International Airport Deploys Facial Recognition

San Diego International Airport Deploys Facial Recognition

An airport in San Diego is utilizing facial recognition to speed up the screening of passengers.

FBI Foiled Planned Fouth of July Attack in Cleveland

FBI Foiled Planned Fourth of July Attack in Cleveland

The suspect was arrested over the weekend for "attempted material support of a foreign terrorist organization."

Google Duplex: What are the Security Implications?

Google Duplex: What are the Security Implications?

This new AI could present new challenges as well as opportunities

Four Dead in Capital Gazette Newsroom Shooting, Suspect in Custody

Five Dead in Capital Gazette Newsroom Shooting, Suspect in Custody

Five people have been killed in a shooting at a local newspaper building in Maryland.

Featured

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3