Top Stories


U.S. Power Company Fined $2.7 Million for Security Flaws

U.S. Power Company Fined $2.7 Million for Security Flaws

According to an electronic filing, an unidentified American power company has reached a settlement to pay a $2.7 million penalty over significant security flaws that could have allowed hackers to gain remote access to their systems.

POTUS Nominates Gina Haspel as First Woman CIA Director

POTUS Nominates Gina Haspel as First Woman CIA Director

President Donald Trump announced via Twitter that Gina Haspel would be taking the place of Mike Pompeo.

The New Reality

Technology marches ever forward, lockstep with ‘Moore’s Law.’ However, the influx of technological change affects different industries in different ways.

Open Options to Showcase DNA Fusion and Unified Solutions at ISC West 2018

ISC West attendees are invited to visit Open Options at booth #3103 to learn about the latest features in the DNA Fusion platform, including FlexAPI, Open Options’ application programming interface, OpenDX database exchange software, and DNA Fusion’s Mobile and Web applications.

Knight Security Systems Opens Full-Service San Antonio Office

New Expansion Satisfies Growing Client Needs Across South Central Texas

White House Outlines Plans for Gun Control, School Safety

White House Outlines Plans for Gun Control, School Safety

President Trump unveiled a school safety plan on Sunday.

Community Appoints Paul Peace as Senior Director of Engineering

Community Professional Loudspeakers is pleased to announce the appointment of Paul Peace as Senior Director of Engineering.

How to Weed the Bad Links Out of Your Inboxes

How to Weed the Bad Links Out of Your Inboxes

Entities need to understand why these attacks are so common and how to combat them.



TSA Chief Says Agency Must Adapt to Changing Security Threats

TSA Chief Says Agency Must Adapt to Changing Security Threats

The Transportation Security Administration must shift their focus away from checkpoints and toward public, less-strictly secured areas of airports in order to adapt to changing threats, according to the agency’s new chief.

One Dead, One Injured in "Accidental" School Shooting

One student was killed and a second was injured Wednesday afternoon in what was called an accidental shooting at Huffman High School in Birmingham, Alabama, authorities said.

BlackBerry Licensing Security Software

BlackBerry Licensing Security Software

The new licensing program is called BlackBerry Secure and aims to protect devices with BlackBerry security technology.

A Digital Defense Against W-2 Theft

A Digital Defense Against W-2 Theft

The FBI gives basic steps to mitigate the threat of W-2 theft.

Tennessee Adopts New Security Standards for Courthouses

Tennessee Adopts New Security Standards for Courthouses

For the first time in two decades, Tennessee is boosting security standards for courthouses across the state.

GDPR: Here

GDPR: Here's What You Need to Know

The European Union will begin to enforce strict data security starting in May. Here's what you should know.

SIA Names James Marcella of Axis Communications as SIA Committee Chair of the Year

SIA Names James Marcella of Axis Communications as SIA Committee Chair of the Year

With this award, SIA honors Marcella for his work in strengthening education programming for the security industry through SIA Education.

Varonis Introduces Support for Hewlett Packard Enterprise 3PAR StoreServ Storage for File Access and Auditing

Proactive data monitoring plays a critical role in securing sensitive business information.

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity was found to be the top technology used by healthcare facilities.

LTE Vulnerability Could Allow Hacker to Send Fake Emergency Alerts

LTE Vulnerability Could Allow Hacker to Send Fake Emergency Alerts

One of the ten attacks can create "artificial choas" by sending a fake emergency alert to cell phone users.

Users Provide Stronger Passwords If They Can Visualize Password Strength

Users Provide Stronger Passwords If They Can Visualize Password Strength

A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.

Two Dead Following Shooting at Central Michigan State Residence Hall

Two Dead Following Shooting at Central Michigan State Residence Hall

The suspected shooter is still at large, and is considered to be armed and dangerous.

Securitas Agrees to Acquire Kratos Public Safety and Security Division

Securitas has agreed to acquire the division Kratos Public Safety and Security from Kratos Defense & Security Solutions, Inc. The purchase price is approximately MSEK 550 (MUSD 69) on a cash and debt-free basis. The acquisition is expected to be neutral to Securitas earnings per share in 2018 and 2019, and accretive as of 2020.

What’s Next?

The growth of technology is everywhere. What’s next for the security industry? I think the next innovation poised to transform the security industry will be deep learning or artificial intelligence (AI), which is a system that learns by looking at masses of data.

Poised for Expansion

Poised for Expansion

Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.

Going All Out

Going All Out

When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.

Security on a High Note

Security on a High Note

The safety and security of visitors and staff and the protection of the Musical Instrument Museum's extensive collection is an essential aspect of fulfilling its mission. With an active facility during both day and evening hours, the museum sought to upgrade its outdoor security surveillance system to improve the quality of the images around the clock.

Eliminating Fraud

The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses.

The New Age

The New Age

Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.

The Next Evolution

The Next Evolution

It is time to pay attention to Artificial Intelligence (AI). With Apple Siri, Google Assistant and now Amazon Echo, voice recognition AI interacts with users worldwide thousands of times a day.

The Changing Landscape

The security landscape is constantly evolving with new products and technologies. With the introduction of these new and improved technologies, it is inevitable that products which have existed within the industry for years may no longer be the go-to choice when it comes to selecting system equipment.

Archiving Security

Archiving Security

The University wanted to implement a robust VMS with good video storage capacity that included alarms and notifications for motion detection or perimeter crossings in order to control potential external and, most importantly, internal theft.

Featured

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3