Top Stories


Critical Infrastructure

Critical Infrastructure: Using Fiber Optic Sensing to Address Threats

Fiber optic sensing is a new tool that may address threats

New Security Measure to Protect Against Acid Attack

New Security Measure to Protect Against Acid Attack

Security forces in Wales are asking people to take a sip out of their water bottles to prove there is not acid in them.

Paris: Man Shot After Driving Car into Soldiers

Paris: Man Shot After Driving Car into Soldiers

Police have shot and wounded a man after a dramatic car chase following an attack on soldiers.

Poor Cybersecurity Could Lead to Fines

Poor Cybersecurity Could Lead to Fines

UK firms could face up to £17 million in fines if they fail to protect themselves from hackers.

Hanwha Techwin America Rolls Out Multi Directional Cameras

Wisenet P series Delivers Innovation, Performance and Reliability

Layers of Security

Layers of Security

The Transportation Security Administration released a video on their YouTube channel explaining the layers of security that go into protecting an airport.

Increased Security for U.S. Mosques after Bombing in Minnesota

Increased Security for U.S. Mosques after Bombing in Minnesota

The act has since been named an “act of terrorism.”

Telaeris Joins AMAG Technology's Symmetry Preferred Partner Program

AMAG Technology welcomes Telaeris to the Symmetry Preferred Partner Program.



UK Issues Strict Security Guidelines for Connected Vehicles

UK Issues Strict Security Guidelines for Connected Vehicles

The UK, nervous about hackers gaining access to moving vehicles, has added strict guidelines to connected cars.

Four Ways Malware Sneaks on to Mobile Devices

Four Ways Malware Sneaks on to Mobile Devices

Fraudsters cast their nets wide in the hopes of snagging unaware and unsuspecting consumers who will unwittingly download malicious applications on to their mobile devices which can then be exploited for short or long-term financial gain by cybercriminals.

Secret Service to Test Drones for Additional Security

Secret Service to Test Drones for Additional Security

The Secret Service will be looking at whether unmanned aerial vehicles could be useful in the protection of the president.

Idesco Releases New Guide For Oversized ID Card Printers

Leading event management security provider offers Free Guide for Oversized ID Card Printers to Event Managers; helps improve security at large-scale events.

School Collapse in Minneapolis Leaves 3 Unaccounted For

School Collapse in Minneapolis Leaves 2 Dead

A gas leak at a Minneapolis schools has caused an explosion leaving 2 staff members dead.

What Businesses Need to Consider When Preparing for IoT

What Businesses Need to Consider When Preparing for IoT

Internet of Things (IoT) technologies are empowering consumers with products and services they simply couldn’t have imagined a few years ago.

Increased Security for Sydney Airport after Foiled Terrorist Plot

Increased Security for Sydney Airport after Foiled Terrorist Plot

Airport security in Australia is seeing an increase after police arrested an Islamist-inspired terror cell that was plotting to blow up an aircraft.

White House Officials Fooled by ‘Email Prankster’

White House Officials Fooled by ‘Email Prankster’

Can your employees spot a fake email?

Dahua Technology Announces Anixter International as New Distribution Partner

Video Surveillance Solutions from Dahua Now Available in 67 Anixter Store Locations throughout the US and Canada

Gearing Up for the Challenge

Gearing Up for the Challenge

While the goal of this campus was to provide a facility for athletes to compete, it was the family, friends and spectators who had a big impact on how it was designed.

Curbing the Violence

Curbing the Violence

Let me let you in on a troubling, not-so-little secret: violence in the workplace is continuing to escalate in medical facilities, despite the fact that national assault rates have been dropping in recent years.

The First Rule, Encrypt

It used to be that the most important aspect of implementing an electronic access control system was the simple control of who went where when. Today, the requirements of these sophisticated systems go beyond.

Implementing a Data-centric Approach

A company is much more complex than an IT department or a number of buildings. It is always evolving and adding more servers, buildings and systems, and therefore, obtaining more risk, costs and threats.

Metro Proof

The lock system of the Amsterdam underground is quite extensive and includes 2,574 cylinders. GVB was able to find and implement a system that solved their key issues as well as environmental issues.

We See You

We See You

The last major advancement in commercial perimeter security was the introduction of CCTV cameras.

On the Tip of their Toes

On the Tip of their Toes

No matter where any given city places a video surveillance camera, there are privacy concerns. There is, however, another side to the story.

Encryption to Cyber Bullying

The most pervasive cyber threat in the past 11 years has been ransomware infections. Who would have even known about something like this 30 years ago, but here we are trying with all diligence to protect folders and files, or even worse, the entire hard drive.

The Backbone

The Backbone

For many years, the sage advice for cybersecurity leaders has been to take a layered approach to security, and those words have served the industry well. Unfortunately, cracks in those layers continue to leave organizations vulnerable to security attacks.

How to Respond - Encryption is used to foil decryption tools

How to Respond

Between 2005 and 2016, ransomware infections were more common than data breaches, making them the most pervasive cyber threat of the last 11 years. Ransomware attacks may encrypt folders and files or even the entire hard drive, or they may just lock the devices so that users cannot access them.

Securing the City

Securing the City

Thanks to new advancements in video analytics technology and powerful Internet of Things (IoT) edge devices; these superheroes can now be armed with new superhuman capabilities to better protect us.

Protecting ATM Connections

With the rising popularity of the Internet accessible machines, the need to protect connections between the disparate ATMs and the banks’ processing centers became critical.

Featured

  • Personal Liability Concerns Impact 70% of Cybersecurity Leaders

    BlackFog, provider of ransomware prevention and anti data exfiltration (ADX), recently unveiled its research conducted with UK and US IT Security decision makers. The research revealed that the majority of respondents, 70%, felt that stories of CISOs being held personally liable for cybersecurity incidents has negatively affected their opinion of the role. Read Now

  • Security Industry Association Announces the 2025 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2025 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both short- and long-term change in the global security industry. Read Now

  • Generative AI, Cybersecurity Among Top Risks for Healthcare Provider Organizations in 2025

    Overseeing the use of generative artificial intelligence, enhancing cybersecurity and ensuring compliance with a host of federal healthcare regulations headline the Top Risks health systems face in 2025, according to an annual study by Kodiak Solutions. Read Now

  • Wisconsin Shooting Likely a 'Combination of Factors'

    Following the deaths of a teacher and student at Abundant Life Christian School in, Madison, Wisc., police chief Shon Barnes indicated that the motive appears to be a “combination of factors” for a 15-year-old female student’s attack on a study hall. Read Now

    • Active Shooter
    • Incident Response

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3