Top Stories


Multi-casualty Incident at Florida High School

Multiple Dead; Shooter in Custody Following Incident at Florida High School

The 19-year-old shooter is now in custody.

At Least One Injured Following Shooting at NSA HQ

An NSA spokesman said the incident is under control.

The New Metrics of Tracking

“When dealers talk to me about their RMR, the first thing I ask is for them to break it down for me. That’s often when things bog down.

Malware Attacks Look to Disrupt Winter Olympics

Malware Attacks Look to Disrupt Winter Olympics

Cybersecurity firms are confirming that a computer malware attack dubbed "Olympic Destroyer" hit Wi-Fi systems at the Winter Games.

IDSecurityOnline.com Kicks Off 2018 With New STEM Scholarship Program

Awards $1000 to University of Maine Student

System Surveyor Releases Advanced Reporting and Robust New Features

Empowering Integrators to Maximize Collaboration, Sales and Margins



Washington State Cannabis Tracking System Hacked

Washington State Cannabis Tracking System Hacked

Washington state’s new cannabis-tracking system was hacked the weekend of Feb. 3, according to the Washington State Liquor and Cannabis Board (WSLCB). Among other information, the hacker stole route information associated with four days of marijuana deliveries.

The iKeyp Pro Review

The iKeyp Pro Review

Relatively new on the market, the iKeyp is a smart safe for everyday use. It is simple to install and easy to connect with via the app on your smartphone.

Chrome to Begin Marking All HTTP Sites as “Not Secure”

Chrome to Begin Marking All HTTP Sites as “Not Secure”

Beginning in July with the release of Chrome 68, Google Chrome will mark all HTTP sites as “not secure”. The Chrome browser already displays a green lock icon and “Secure” sign in the URL bar for HTTPS-encrypted websites.

Getting a Kick out of Security

Getting a Kick out of Security

You’ll get a real kick out of this security story. It is all about a secure perimeter and access control that is stored in the cloud and a man devoted to those around him.

Getting the Most from Camera Analytics Requires the Right VMS

Getting the Most from Camera Analytics Requires the Right VMS

Ideal for customers seeking an easy to use end-to-end video surveillance solution, WAVE is highly customizable and can create tailored network video solutions for any type of project, on any device.

Roku, Samsung Smart TVs Have Easy-to-Exploit Vulernabilities

Roku, Samsung Smart TVs Have Easy-to-Exploit Vulernabilities

Consumer Report says its testing found that Roku devices and Samsung Smart TVs have security flaws that make them vulnerabilities to hackers.

BYU Introduces SafeWalk App

BYU Introduces SafeWalk Feature to App

The new university app feature, called Safewalk, expands on an already existent BYU program to enable police to track students’ locations through their smartphones and virtually “walk” with students through campus and the student housing areas.

Biometrics Market to Hit $50 Billion by 2024

Biometrics Market to Hit $50 Billion by 2024

High acceptance among various verticals including mobile banking and financial services owing to rising security concerns has enhanced biometrics market size.

Aeroturn Announces Inclusion on ARCAT Website

Leading Connecticut-based turnstile manufacturer starts the year off in the right direction by making it easier for architects & engineers to specify Aeroturn’s solutions.

Soldiers Called in to Replace over 1,000 Sick Security Staff Members

Soldiers Called in to Replace over 1,000 Sick Security Staff Members

Soldiers have taken on the work of guarding Pyeongchang's ice area ahead of the Winter Olympics' Opening Ceremony.

Ransomware Added to Oxford English Dictionary

Ransomware Added to Oxford English Dictionary

The word "ransomware" has been recognized by the Oxford English Dictionary.

Winter Olympic Security Includes Drones that Catch Drones

Winter Olympic Security Includes Drones that Catch Drones

Security personnel will be on the lookout for suspicious drones during the Winter Olympics in South Korea.

Cyber Security Insurance: How Businesses Will Develop in 2018

Cyber Security Insurance: How Businesses Will Develop in 2018

The importance of cyber security insurance, and how businesses can increase their privacy to protect themselves against hackers.

Motorola Solutions Buys Avigilon

Motorola Solutions Moves into Video Surveillance with Purchase of Avigilon

Motorola Solutions has acquired Avigilon.

Tend Lynx Indoor Camera is Small but Mighty

Tend Lynx Indoor Camera is Small, but Mighty

The Tend Lynx Indoor Camera doesn’t look like much, but its multi-use functionality make it a great option for DIY security beginners.

Ante Up

Like many gaming venues, the lighting scheme at the Hard Rock Hotel & Casino in Tulsa, Okla., focuses on creating an atmosphere of fun and excitement.

Metro Security

Metro Security

It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility.

The Cost of Cybercrime

The Cost of Cybercrime

Cybercrime is a large and dangerous business and it impacts individuals, businesses and governments worldwide.

Locking the Cabinet

Locking the Cabinet

Providing independent consulting, best-inclass products, hosting solutions and financial services to more than 1,000 U.S.- and Canada-based companies, Forsythe is one of the largest independent IT integrators in North America.

Luxury in Your Apartment

Luxury in Your Apartment

Commerce Tower on Main, in Kansas City, Mo., is redefining downtown apartment living by creating an energy-efficient, vertical neighborhood with luxury apartments, exclusive amenities and a connected lifestyle.

Transforming Security

Transforming Security

Empresa Eléctrica de Guatemala (EEGSA Group) required a video surveillance system that could digitize the security footage on its substations to help avoid damage to its own infrastructure as well as electrocution hazards for people trying to access these places without warning or authorization.

Featured

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3