Top Stories


Capitol Increases Securty Following Kavanaugh Testimony

Capitol Increases Securty Following Kavanaugh Testimony

Police are stepping up patrols in the Capitol amid the intense debate over confirming Brett Kavanaugh.

5 Things You Can Do to Avoid Battery Related Risks

5 Things You Can Do to Avoid Battery-Related Risks

With unexpected severe weather and natural disasters looming, one power outage can leave your customers’ businesses at risk.

FDA is Tackling Medical Device Security

FDA is Tackling Medical Device Security

The FDA is taking steps to strengthen medical device cybersecurity.

Packages Destined to Pentagon, White House Tested for Poison

Packages Destined to Pentagon, White House Tested for Poison

Neither package entered the Pentagon, and they were both turned over to the FBI for further analysis, according to authorities.

New Google App Aims to Prevent DNS Manipulation Attack

New Google App Aims to Prevent DNS Manipulation Attack

Google's cyber unit has introduced a new app dedicated to protecting users from state-sponsored censorship.

Live From GSX: Wrap Up

Live From GSX: Wrap Up

Rebranding Your Name

As I ponder the final message from Global Security Exchange (GSX), I have to think that the rebranding of ASIS to GSX was a mistake. After spending two and a half days on the show floor, and talking to numerous people, not a single person referred to the show as GSX.



29 Complete Homeland Security Master

29 Complete Homeland Security Master's Degree Program

These graduates will join a national cadre of cohorts who are helping keep our nation safer.

New York City Launches Security App

New York City Launches Cybersecurity App

The smartphone application will help New York City residents increase their personal cybersecurity.

Facebook Hacked: 50 Million Users

Facebook Hacked: 50 Million Users' Data Exposed

Attackers stole log-in credentials, allowing them to take over user accounts.

California Law Demands More Security From Connected Devices

California Law Demands More Security From Connected Devices

Ohio University to Spend $1 Million on Security Following Sexual Assaults

Streamlined for Success

Streamlined for Success

In a new industry with strict regulatory requirements, the video surveillance system is everything but ordinary. First, it had to be a modular system to allow the company to scale it through the multiphase project.

Enhancing Security

Enhancing Security

Video analytics solutions are enabling organizations to realize the full value of their video surveillance resources and enhance safety, security and overall business operations.

Complete Perimeter Solution

Complete Perimeter Solution

A key trend for 2018 has been the integration of AI with various security systems. AI-enabled surveillance cameras, facial recognition software, and fingerprint authentication scanners are just a few examples.

An Eye on the Campus

An Eye on the Campus

Every day, tens of millions of parents entrust schools with their children’s safety and every day, those parents worry if that trust is misplaced. In addition to the frequent headlines about school shootings, children deal with other pressing issues at school, whether it’s bullying, drugs or harassment.

Keeping the Bad Guys Out

Keeping the Bad Guys Out

Protecting government agencies requires the widest palette of security solutions with facilities ranging from a storefront military recruitment center to a bustling international airport or a biological research center.

Offering More than Products

Offering More than Products

In the security industry, our mission is critical: protect the people, places and things that matter most.

Total Cost of Ownership

As cloud computing and software as a service (SaaS) have evolved, video surveillance as a service (VSaaS) or cloud surveillance, has emerged as the most popular option for businesses seeking to simplify their physical security installations.

Making Your Expertise Unique

Making Your Expertise Unique

Every businessperson wants to bring something different, or unique, to the table when they talk about their business solutions. In the security industry, or more particularly, the security consultant, the same applies. You’ve got to have a secret sauce.

Solving Problems

Solving Problems

The industry is changing so rapidly that the following statement might seem bold but it’s true. No one wants to buy a camera.

Creating Cloud Platforms

Creating Cloud Platforms

Cloud technologies are giving people access through their mobile phones and other devices to a variety of new experiences, while making their workplaces smarter and more data-driven.

Going High Tech

With the added video capabilities, Manteno authorities can alert agencies north or south of town to be on the lookout for specific vehicles with good description details.

A Smart Security Program

A Smart Security Program

Northwestern Mutual operated several disparate security systems for access control, alarm management, intercom, video and visitor management. The new building project provided an opportunity to upgrade the security system and overall security program.

Protecting Hard to Protect Areas

Protecting Hard to Protect Areas

By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks.

The Command Center of the Future

The Command Center of the Future

At the center of any government organization’s security operation stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or Security Operations Center (SOC).

Stick ‘Em Up, Partner

The TSA is implementing some pretty amazing technology in order to improve explosives detection. In late August, the agency unveiled a state-of-theart advanced technology computed tomography (CT) checkpoint scanner for screening passengers and their baggage.

Featured

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

  • Why the Future of Video Security Is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reasons. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.