Top Stories


London Police Review Security, Search for Motive Following Attack

London Police Review Security, Search for Motive Following Attack

Britain police are looking to review security efforts around Parliament after a vehicle and knife attack that killed four people.

Connected Security Expo Returns to ISC West For its Second Year

After a successful inaugural run in 2016, the Connected Security Expo is back for year two at ISC West 2017 with some important changes.

Get the Most out of ISC West 2017

Take a walk around the show room floor, talk with those you do business with and post on social media!

Nightclub Shooting in Cincinnati Leaves 1 Dead, 15 Injured

Nightclub Shooting in Cincinnati Leaves 1 Dead, 15 Injured

Police are not investigating this incident as terrorism.

3 Packing Tips for ISC West

3 Packing Tips for ISC West

If there is anything I’ve learned in my one year at ISC West it’s how to pack for the event.

Check out These ISC West Education Sessions

Each year, ISC West offers some amazing sessions for attendees. There are almost 100 to choose from, so there is bound to be more than a few you'd want to check out. Plus, it's a great way to hear about new technologies, network and build some rewarding work relationships.

How to Prepare for ISC West

No matter how many times you've been to ISC West, the sheer size of the show will never cease to amaze.

Credit Union Upgrades Video Surveillance Solution to Prepare for Future Capabilities

Credit Union Upgrades Video Surveillance Solution to Prepare for Future Capabilities

When the largest credit union based on Vancouver Island and the Gulf Islands off the coast of British Columbia decided to deploy a March Networks enterprise-wide video surveillance system in 2013, the opportunity to take advantage of advanced functionality was top of mind.



The Big Push

About 1,000 of our best friends will be putting their latest technology on display in Las Vegas next week, and I'm anxious to see what's new and what has evolved over the past few months.

Vicon Introduces Wide Selection of H.265 Cameras at ISC West

These HD Cameras Reduce Bandwidth Utilization and Storage Requirements

How to prepare your network and defend against the “Gadget Hordes”

How to Prepare Your Network and Defend Against the “Gadget Hordes”

With each passing year, network and security administrators have been faced with more and more devices appearing inside the walls of their corporate network.

Warren Associates To Market and Sell SALTO Systems Electronic Lock Solutions in Northern California, Rocky Mountain States

SALTO Systems has hired Warren Associates to market and sell SALTO’s innovative security products in Northern California, Northern Nevada, Utah, Colorado, Montana, New Mexico, Wyoming, and Idaho.

Live From ISC West 2017 Now Available

Live From ISC West 2017 Now Available

The live webpage will frequently update with content from the show floor.

Sielox Offers New Lock Toggle for 1700 Intelligent Controller

Fully integrated with Schlage AD, NDE and LE wireless locks

London Anticipated Terrorist Attack

London Anticipated Terrorist Attack

Current events around the world helped London to quickly stop a suspected terrorist attack.

MONI Smart Security to Emerge at ISC West 2017 Better Faster and Stronger

New programs, partnerships and accolades command recognition

British Parliament on Lockdown after Incident Outside

London: ISIS Claims Attack, Number Injured Rises, Suspect Identified

London police responded to a security incident outside the UK House of Commons.

Tech Ban on Some Foreign Flights into the US

Tech Ban on Some Foreign Flights into the U.S.

TSA recently ordered nine airlines to stop passengers from bringing most types of tech on board.

If You Build It, They will Come - IoT Driven Botnet Attacks

If You Build It, They Will Come - IoT Driven Botnet Attacks

Regardless of term, or use case, it’s well-known that cybercriminals can hack into any vulnerable device connected to the internet to remotely take control of that device and enslave it into a botnet that is part of a distributed denial-of-service (DDoS) attack.

Reports of Potential Data Breach at Saks Fifth Ave

Reports of Potential Data Breach at Saks Fifth Ave

Over the weekend, Saks Fifth Ave reported that customers’ data may be exposed.

FBI Director: No Evidence of Wiretap

FBI Director: No Evidence of Wiretap

In a hearing with the Intelligence Committee, FBI Director James Comey said there was no evidence to support President Trump’s tweets claiming Trump Tower was wiretapped by former President Obama.

Why is the Security Industry Failing?

Why is the Security Industry Failing?

We have failed to focus on what’s most important: building security in.

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung will finally offer monthly security updates.

Stopping the Post-EMV Surge in Online Fraud

Stopping the Post-EMV Surge in Online Fraud

The predicted increase in online fraud in the U.S. has arrived with the adoption of chip card technology.

Brivo Announces Partnership with Mercury Security

Brivo Announces Partnership with Mercury Security To Support An Open Hardware Platform for its Access Control Solution

4 Charged in Yahoo Data Breach

4 Charged in Yahoo Data Breach

Four people, including two officers from Russian security services, were charged by the U.S. in the massive data breach that plagued Yahoo.

Homeland Security Finds Human Vetting More Effective than Computers

Homeland Security Finds Human Vetting More Effective than Computers

Report finds scanning social media accounts is best done by humans.

Panel of Industry Execs to Discuss the Impact of the IoT at ISC West 2017

Panel to Address Benefits and Downside of Technologies Driving Networked Systems

Protests after Release of New Michael Brown Surveillance Footage

Protests after Release of New Michael Brown Surveillance Footage

New video shows Michael Brown at the convenience store police say he robbed hours before he died.

White House Breach

White House Breach

Intruder breaches White House grounds and was arrested near residence entrance.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3