Top Stories


How to Weed the Bad Links Out of Your Inboxes

How to Weed the Bad Links Out of Your Inboxes

Entities need to understand why these attacks are so common and how to combat them.

TSA Chief Says Agency Must Adapt to Changing Security Threats

TSA Chief Says Agency Must Adapt to Changing Security Threats

The Transportation Security Administration must shift their focus away from checkpoints and toward public, less-strictly secured areas of airports in order to adapt to changing threats, according to the agency’s new chief.

One Dead, One Injured in "Accidental" School Shooting

One student was killed and a second was injured Wednesday afternoon in what was called an accidental shooting at Huffman High School in Birmingham, Alabama, authorities said.

BlackBerry Licensing Security Software

BlackBerry Licensing Security Software

The new licensing program is called BlackBerry Secure and aims to protect devices with BlackBerry security technology.

A Digital Defense Against W-2 Theft

A Digital Defense Against W-2 Theft

The FBI gives basic steps to mitigate the threat of W-2 theft.

Tennessee Adopts New Security Standards for Courthouses

Tennessee Adopts New Security Standards for Courthouses

For the first time in two decades, Tennessee is boosting security standards for courthouses across the state.

GDPR: Here

GDPR: Here's What You Need to Know

The European Union will begin to enforce strict data security starting in May. Here's what you should know.

SIA Names James Marcella of Axis Communications as SIA Committee Chair of the Year

SIA Names James Marcella of Axis Communications as SIA Committee Chair of the Year

With this award, SIA honors Marcella for his work in strengthening education programming for the security industry through SIA Education.



Varonis Introduces Support for Hewlett Packard Enterprise 3PAR StoreServ Storage for File Access and Auditing

Proactive data monitoring plays a critical role in securing sensitive business information.

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity was found to be the top technology used by healthcare facilities.

LTE Vulnerability Could Allow Hacker to Send Fake Emergency Alerts

LTE Vulnerability Could Allow Hacker to Send Fake Emergency Alerts

One of the ten attacks can create "artificial choas" by sending a fake emergency alert to cell phone users.

Users Provide Stronger Passwords If They Can Visualize Password Strength

Users Provide Stronger Passwords If They Can Visualize Password Strength

A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.

Two Dead Following Shooting at Central Michigan State Residence Hall

Two Dead Following Shooting at Central Michigan State Residence Hall

The suspected shooter is still at large, and is considered to be armed and dangerous.

Securitas Agrees to Acquire Kratos Public Safety and Security Division

Securitas has agreed to acquire the division Kratos Public Safety and Security from Kratos Defense & Security Solutions, Inc. The purchase price is approximately MSEK 550 (MUSD 69) on a cash and debt-free basis. The acquisition is expected to be neutral to Securitas earnings per share in 2018 and 2019, and accretive as of 2020.

What’s Next?

The growth of technology is everywhere. What’s next for the security industry? I think the next innovation poised to transform the security industry will be deep learning or artificial intelligence (AI), which is a system that learns by looking at masses of data.

Poised for Expansion

Poised for Expansion

Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.

Going All Out

Going All Out

When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.

Security on a High Note

Security on a High Note

The safety and security of visitors and staff and the protection of the Musical Instrument Museum's extensive collection is an essential aspect of fulfilling its mission. With an active facility during both day and evening hours, the museum sought to upgrade its outdoor security surveillance system to improve the quality of the images around the clock.

Eliminating Fraud

The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses.

The New Age

The New Age

Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.

The Next Evolution

The Next Evolution

It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.

The Changing Landscape

The security landscape is constantly evolving with new products and technologies. With the introduction of these new and improved technologies, it is inevitable that products which have existed within the industry for years may no longer be the go-to choice when it comes to selecting system equipment.

Archiving Security

Archiving Security

The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.

The Best Bet

The Best Bet

The casino and hospitality industry includes hotels, restaurants, entertainment venues as well as gaming elements to entertain visitors and guests.

Booking an Upgrade

Booking an Upgrade

Farmington community library needed access control to restricted areas and employee entrances, video surveillance at the building perimeter, parking lots, restricted and common areas, and intrusion detection on all controlled doors.

Get Out of Our Space

Get Out of Our Space

Most people, when confronting a drone (Unmanned Air Vehicle/Unmanned Air System) operating in or around their area of responsibility in an unsafe manner, would like to bring it down immediately.

Lost in the Lumens

Most of us can recall our elders offering the sage counsel of “moderation in all things.” It seems that dated phrase has become quite apropos once again especially as it applies to the discussion of the lumens needed in flashlights for law enforcement and security staff.

Updating Legacy Power Systems

It is exciting times for physical security today. Technology has advanced at breakneck speeds, quite significant for an industry that seemed to stand still for decades.

Playing by the Rules, or Metrics

Recurring Monthly Revenue, almost always referred as RMR, is probably the most important metric of any subscription business.

Our Digital Identities

Our Digital Identities

Blockchain, the backbone technology behind Bitcoin, has grown exponentially since its inception in 2008. Since 2013, Google searches of “blockchain” have risen by 1,900 percent.

Featured

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3