Top Stories


How to Respond - Encryption is used to foil decryption tools

How to Respond

Between 2005 and 2016, ransomware infections were more common than data breaches, making them the most pervasive cyber threat of the last 11 years. Ransomware attacks may encrypt folders and files or even the entire hard drive, or they may just lock the devices so that users cannot access them.

Securing the City

Securing the City

Thanks to new advancements in video analytics technology and powerful Internet of Things (IoT) edge devices; these superheroes can now be armed with new superhuman capabilities to better protect us.

Protecting ATM Connections

With the rising popularity of the Internet accessible machines, the need to protect connections between the disparate ATMs and the banks’ processing centers became critical.

Think About the Future

Think About the Future

Video is a natural choice for security because as humans, we use our eyes more than any of our other senses.

It Matters Where Its Made

When you walk through the CyberLock facility with Tammy Davis, you truly get a sense of pride, responsibility and an amazing relationship she has developed within the community.

The Potential of Biometrics

The Potential of Biometrics

Many financial institutions are looking to biometrics to enhance customer trust and convenience, and for securing the bank enterprise and facilities.

Being Connected

The security of corporate data is critical to the integrity of operations. Yet, everywhere we turn, it seems like another company has become victim to some form of cyber threat, malware or ransomware attack.

HBO Victim in Latest Cyberattack

HBO Victim in Latest Cyberattack

Unreleased episodes of HBO shows and Game of Thrones scripts have been leaked as a result of the attack.



Vehicle Crash in Los Angeles Injures Eight Pedestrians

Vehicle Crash in Los Angeles Injures Eight Pedestrians

Eight people were injured when a van hopped the curb and crashed into a group of people dining at a popular restaurant.

MivaTek Announces Robert Moeller as New Vice President of Global Sales

Will Increase Awareness, Sales of the MivaTek Mobile-Cloud Platform & Retail Brands

Business Icon Mark Cuban Joins ASIS 2017 Keynote Lineup

4-day event to draw 22,000 security pros to Dallas, TX. Advance registration savings end August 11.

Smart Appliances should have Cybersecurity Rating

Smart Appliances should have Cybersecurity Rating

Televisions, fridges and other internet-connected home appliances should carry a security rating, a police chief suggested.

Israel Sees Push Back After Installing Security Measures at Religious Site

UPDATE: Israel Embassy Shooting in Jordan Deepens Uncertainties about Security at Temple Mount

Israel began implementing new security measures at entrances of one of the most holy sites in Jerusalem.

Security Cameras Shed Light On ‘Horrific’ Human-Smuggling Incident

Security Cameras Shed Light On 'Horrific' Human-Smuggling Incident

Surveillance cameras in a Walmart parking lot helped officials in their investigation into a human-smuggling case that left nine people dead.

Safe and Secure: A look into Artificial Intelligence Technology

Safe and Secure: A look into Artificial Intelligence Technology

AIT is everywhere. It has shaped the way we interact with the companies and businesses we patronize, either through chat assistance, e-mail spam algorithms, or fraud security monitoring for suspicious activity.

Erie Insurance Arena Improves Security Measures

Erie Insurance Arena Improves Security Measures

Authorities at Erie Insurance Arena enhance security though metal detectors and other security measures to increase patron safety.

The Human Side of Security:  Security Threats and Considerations For Today’s Mobile Workforce

The Human Side of Security: Security Threats and Considerations For Today’s Mobile Workforce

While flexibility is empowering the workforce, it is also complicating data security.

Security Industry Veteran Establishes Autonomous Security Association

Industry Trade Association Focused On Unmanned Ground, Aerial, and Marine Security Robotics

Mexico to Strengthen Security on U.S.-Bound Flights

Mexico to Strengthen Security on U.S.-Bound Flights

Electronics bigger than a cell phone will be subject to added security on flights heading to the United States from Mexico.

Ascent Capital Group announces appointment of Fred Graffam as Chief Financial Officer

Ascent Capital Group announces appointment of Fred Graffam as Chief Financial Officer

Security Robot Plunges Into Fountain

Security Robot Plunges Into Fountain

A security robot effectively ended its watch when it plunged itself into a fountain at a Washington D.C. office building.

Pelco Optera Panoramic Multi-Sensor Cameras Integrate with Leading VMS Solutions

Best-in-Class Panoramic Cameras Deliver Panomersive HD Imaging That Surrounds You

The Ins and Outs of CCTV Training

The Ins and Outs of CCTV Training

Most people will agree that there is a definite need and requirement for CCTV training, but they are not very sure how and where to get this training.

New Laws Give Australia’s Military Greater Powers in the Event of a Terror Attack

New Laws Give Australia's Military Greater Powers in the Event of a Terror Attack

Australia’s prime minister announced the new laws Monday.

Preventing a “Fleet-wide” Hack is Tesla’s Top Security Priority

Preventing a “Fleet-wide” Hack is Tesla’s Top Security Priority

Elon Musk commented on Tesla’s cybsersecurity during his talk at the National Governor’s Association this weekend.

Chicago Airport Security Officers to Shed ‘Police’ Label after United Fiasco

Chicago Airport Security Officers to Shed 'Police' Label after United Fiasco

In a video clip taken on-board a United Airlines flight, men seen wearing saying “police” dragged a man down the aisle of the plane.

Tour de France Organizers Increase Security with Additional Officers, Bomb Dogs

Tour de France Organizers Increase Security with Additional Officers, Bomb Dogs

The world’s largest sporting event sees a heightened sense of security.

14 Trump Properties Breached by Hackers

14 Trump Properties Breached by Hackers

Guests at 14 properties bearing the name of Trump might have their credit card information breached by hackers.

University of New Haven Cyber Forensics Team Launches Digital Forensics Database

First Time Cases, Investigators Linked Globally

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3