Top Stories


Protecting Your Data

Protecting Your Data

Even if you don’t have a Facebook account, you have undoubtedly heard the reports about how Cambridge Analytica accessed the personally identifiable information (PII) of up to 87 million users over a period of several years.

Key Considerations

Key Considerations

Having both specific and shared goals is what makes medical centers quite unique to security. Rarely are two buildings alike, yet they all have common needs, requirements and goals.

Be Strong

Be Strong

Looking at examples of how municipalities or governments protect these assets can help businesses plan as well. Critical infrastructure for businesses often shares similar needs with municipalities: how do we best protect servers, structures and the people who live and work in private buildings?

Integrate to Save

Integrate to Save

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT.

Trusted Identities

Trusted Identities

As with all major sporting and entertainment events, the goal is for everyone using a ticket to have purchased it from the authorized ticketing entity and to have a seamless experience both when they pick it up and when they present it at the venue.

Layering Facility Security

Layering Facility Security

Today’s facility operators must prepare for virtually any event from vandalism to a terrorist attack. With facilities ranging in size and use—from an emergency communications center to a multi-family apartment building—there’s no readily available one-size-fits-all security plan.

Bollards at the Benz

Bollards at the Benz

While the threat of terrorists planning to attack soft targets, such as stadiums, increases, stadium security professionals must look for the weak points throughout their facilities to determine where fanatics are most likely to assail.

Swinging For The Fence

Swinging For The Fence

With more than 120 permanent network cameras in place at Volunteer Stadium and Howard J. Lamade Stadium, Little League International works to add new technologies each year to keep the installation as secure as possible



Red Hawk Buys SDT to Grow Presence in Philadelphia Region

Red Hawk Fire & Security, LLC. has announced the purchase of Security and Data Technologies, Inc., (SDT) to continue extending its reach to customers in Philadelphia, and the tri-state area of Eastern Pennsylvania, Central and Southern New Jersey and Delaware.

Comparing Wireless Communication Protocols

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

Reducing Crime

Reducing Crime

With police departments often being under budgeted and over worked, resulting in reduced patrols and delayed response, many business owners have come to expect that valuable assets stored outdoors are going to be subject to theft and vandalism, and these costs just need to be absorbed.

Foxwoods Casino Upgrades Video Surveillance System

Foxwoods Casino Upgrades Video Surveillance System

As Foxwoods grew and expanded, so did the need for a state-of-theart, integrated video surveillance system to provide necessary coverage and security for the gaming facilities.

Moving From Mechanic to Electric

In 2017, the HUSD sought to upgrade existing mechanical locks to electronic locks. With more than 5,000 doors across 28 campuses districtwide, the transition was sure to be a significant undertaking.

Integrators are Product Savvy

It has become crystal clear to me that integrators and distributors are experts in product development in this industry.

On the Run

The modern workplace is increasingly mobile. The prevalence of secure mobile internet and emphasis on face-to-face collaboration has seen corporations increasingly emphasize remote work for their employees.

The New World We Live In

I’m old enough to remember fire alarm drills and hiding under my desk as a youth. The fire alarm drills were great because we were able to leave the classroom and go outside. I never understood hiding under the desk, but went along with it anyway. That’s the world I grew up in.

Clustering Attacks on Web Apps to Find the Real Story Behind the Headlines

Clustering Attacks on Web Apps to Find the Real Story Behind the Headlines

Our goal of clustering attacks on web applications is two-fold

Going Global

Going Global

The new and growing interest in the technology sector has given rise to a new phenomenon known as “Tech tourism,” whereby tech companies have seen ever increasing numbers of visitors being attracted to their sites as tech enthusiasts undertake a kind of digital pilgrimage.

Arkansas PAnel Calls for Armed Presence at All Schools

Arkansas Panel Calls for Armed Presence at All Schools

Arkansas looks for ways to boost security on campuses.

21 Million Users Affected by Timehop Data Breach

21 Million Users Affected by Timehop Data Breach

Timehop disclosed a security breach that has compromised the personal data, including names and emails, of its 21 million users

Catholic Diocese of Fort Worth Shifts Focus to Security

Catholic Diocese of Fort Worth Shifts Focus to Security

Catholic churches in Fort Worth have removed signs banning guns, but that doesn't mean the policy has changed.

Smithsonian to Add Permanent Security Checkpoints at National Zoo

Smithsonian to Add Permanent Security Checkpoints at National Zoo

The National Zoo is the only Smithsonian public venue without security screening.

The Case for Deploying H.265 in Video Surveillance

The Case for Deploying H.265 in Video Surveillance

As the security industry continues to embrace 4K, Ultra HD and other high-resolution imaging formats with high bitrates, recording and storing surveillance video has become one of the main challenges facing end users and systems integrators.

How Your Organization Can Get Started with Information Security

How Your Organization Can Get Started with Information Security

Information Security it is one of the most in demand skill sets in all the technology industry.

San Diego International Airport Deploys Facial Recognition

San Diego International Airport Deploys Facial Recognition

An airport in San Diego is utilizing facial recognition to speed up the screening of passengers.

Campus Security Market to Continue Grow In Response to Incidents

Campus Security Market to Continue Growing In Response to Incidents

The campus security market is expected to reach $2.8 billion by 2021.

Cities Boost Security for Fourth of July Celebrations

Cities Boost Security for Fourth of July Celebrations

In the wake of a foiled attack in Cleveland, police around the country are stepping up security for the Fourth.

FBI Foiled Planned Fouth of July Attack in Cleveland

FBI Foiled Planned Fourth of July Attack in Cleveland

The suspect was arrested over the weekend for "attempted material support of a foreign terrorist organization."

Google Duplex: What are the Security Implications?

Google Duplex: What are the Security Implications?

This new AI could present new challenges as well as opportunities

Four Dead in Capital Gazette Newsroom Shooting, Suspect in Custody

Five Dead in Capital Gazette Newsroom Shooting, Suspect in Custody

Five people have been killed in a shooting at a local newspaper building in Maryland.

Featured

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.