Top Stories


Running to Security

Running to Security

You are an integrator, and imagine you could have any installation job you wanted. What would you choose? Would it be a well-known company, or a prestigious location? What if you could have both?

An Ounce of Prevention

An Ounce of Prevention

Common sense dictates that it is easier to stop something from happening in the first place than to repair the damage after it has been done.

Thermal Cameras are Hot

Thermal Cameras are Hot

Network thermal cameras were first introduced to the security market in 2010 filling a critical detection gap in network video systems.

Video Reliability, Serviceability and Convenience

Video Reliability, Serviceability and Convenience

What to look for and how it affects your organization.

U.S. Reveals New Airport Security Measures to Avoid Laptop Ban

U.S. Reveals New Airport Security Measures to Avoid Laptop Ban

The United States has unveiled enhanced security measures for flights to the country designed to prevent a laptop ban.

Homeland Security to Begin Creating Border Wall Prototypes

Homeland Security to Begin Creating Border Wall Prototypes

This summer, the Department of Homeland Security will begin building prototypes for the wall proposed by President Trump on his campaign trail.

Vicon Welcomes Dolores Wellisch as Director of Marketing

The Company Looks to Her to Lead New Branding Initiative

Hanwha Techwin America Launches Wisenet Professional Certification Program

Program Empowers Security Industry Professionals to Enhance Best Practices



New Ransomware Attach Infects Airlines, Banks and Utilities across the World

New Ransomware Attack Infects Airlines, Banks and Utilities across the World

Yesterday, PC users across the world were asking for help as ransomware took data hostage and locked users out of their computers.

2017 Safest College Campuses in America

2017 Safest College Campuses in America

See which college campuses top the list of the safest in the United States.

Great Systems Start with Great Planning

Great Systems Start with Great Planning

To ensure that new and enhanced systems best meet expectations, one of the most critical steps in the design process is in the initial planning stages

Government Websites Hacked with ISIS Messages

Government Websites Hacked with ISIS Messages

Government websites in Ohio, Maryland and New York were targeted.

Napco Names Glenn Kocek New Midwest Regional Sales Manager

Glenn joins Napco’s sales team with many years of security experience, in all facets of the industry, including roles with LRG and Tyco/ADT.

Members of Parliament Fall Victim to Cyber Attack

Members of Parliament Fall Victim to Cyber Attack

Fewer than 90 email accounts with weak passwords are believed to have been hacked in “sustained” attack.

Security to be Tight at Denver Comic Con

Security to be Tight at Denver Comic Con

Denver will be hosting the conference for the fifth time, but never with so much security.

Girl Scouts to Earn Badges in Cybersecurity

Girl Scouts to Earn Badges in Cybersecurity

The education program is being developed in a partnership between the Girl Scouts and Palo Alto Networks.

Vicon Appoints Fredrik Wallberg as Director of A&E Services

This Newly Created Position Expands Vicon’s Dedicated A&E Support Team

Star Tribune names IdentiSys a 2017 Top 150 Workplace

IdentiSys was ranked #35 on the small company list.

IC Realtime Video Surveillance Cameras Integrate with Amazon Echo Show

By way of development work with Amazon’s camera API, IC Realtime has made it possible for more than 100 of its video surveillance cameras to stream live video to Echo Show. Sent securely through IC Realtime’s ICMyCloud service, the video is activated by simply saying ‘Alexa, Show My Camera’

Airport Officer Stabbing Being Investigated as Terrorism

Airport Officer Stabbing Being Investigated as Terrorism

Authorities believe the stabbing of an airport officer was an “act of terrorism.”

SMS-Based Authentication Is Imploding, Precisely as Experts Predicted

SMS-Based Authentication Is Imploding, Precisely as Experts Predicted

For a relatively long time it seemed as if the password problem had been solved using SMS text messages.

Attempted Terror Attack in Brussels Could Have Been A Lot Worse

Attempted Terror Attack in Brussels Could Have Been A Lot Worse

Soldiers shot and killed a man who attempted to cause mass casualties in a Brussels train station.

Chicago Hires New Airport Security Chief After United Blunder

Chicago Hires New Airport Security Chief After United Blunder

Chicago's O'Hare International Airport was at the center of a PR nightmare after a man was dragged off a plane.

Pelco Launches VideoXpert Professional VMS for SMB Applications

Offers One-Year “Control with Confidence” Free Software License Trial to Users and Integrators

Defining the New PSIM Model for Commercial Security Applications

Defining the New PSIM Model for Commercial Security Applications

Today, advanced PSIM solutions with software architecture flexible enough to adapt to complex commercial organizations are being successfully deployed.

Vehicle Crashes into Police Car on Champs-Elysees in Deliberate Attack

Vehicle Crashes into Police Car on Champs-Elysees in Deliberate Attack

The driver died in the incident but no one else was hurt.

ASSE 'Becoming Stronger, More Vibrant,' President Says

Outgoing President Tom Cecich, CSP, CIH, cited several initiatives as he greeted attendees at the opening general sessions of Safety 2017, the largest annual conference in the society's 106-year history.

Camden Unveils New Web Site Order Tracking System

The new tracking system enables Camden customers to simply enter their purchase order number on the Camden web site and instantly view a detailed ‘cradle to grave’ summary of their order status.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities