Top Stories


Shifting the Selling Paradigm

Shifting the Selling Paradigm

With the increased focus on home automation and associated “smart home” devices, it is incumbent on security dealers, installers and integrators to do more than simply sell security products.

Access Control in the Midst of an IP Revolution

Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.

One Innovation at a Time

One Innovation at a Time

Today, Dedicated Micros continues to conceptualize and develop ground breaking video surveillance solutions to meet industry needs.

Ensuring Success

Ensuring Success

Those words are often associated with the real estate industry, but the security community can also apply that mantra to the all-important issue of camera placement for optimizing analytics.

The Big House

The Big House

A large corrections campus encompassing more than 30 buildings in the southeast United States houses approximately 5,000 inmates with separate jail facilities for men and women who are awaiting sentencing, serving sentenced jail time and are in maximum security.

The User Experience

The User Experience

With the move to a mobile- and cloud-first world, corporate data has become increasingly difficult to protect.

No Protection From Bad Data

No Protection From Bad Data

Walking the expo floor at the most recent RSA conference, it was hard to miss how many companies were talking about big data.

Security in the Sanctuary

Security in the Sanctuary

I wouldn’t consider myself an extremely religious man, but I do go to church on a weekly basis, and I do expect my presence in the church to be safe and secure.



High Value Assets

High Value Assets

Perimeter security: Just the words conjure-up visions of horror.

A Key Role

A Key Role

The city of Calgary in southern Alberta, Canada has achieved international acclaim with its annual Calgary Stampede and its legacy of world-class sporting facilities and events.

Breaching the Network

Breaching the Network

Cyberattacks are one of the greatest threats facing global businesses today.

Privileged Identities

Privileged Identities

Over the last year, we have witnessed a series of staggering data breaches affecting some of the world’s leading businesses— with each breach seemingly worse than the last in terms of financial and reputational damage.

Securing Your Car

Securing Your Car

Chances are, when you picked a parking place this morning, you weren’t thinking about security in that facility.

Part 5: Wake the Flight Crew

Part 5: Wake the Flight Crew

Five key areas of understanding for information security directors.

Pay Now or Pay Later

Part 4: Pay Now or Pay Later

Breaches of all sizes - small, medium and large - ruin reputations and can cost millions of dollars.

Man Bypasses Security at DFW Airport without ticket or ID

Man Bypasses Security at DFW Airport without ticket or ID

Damarias Cockerham passed through the TSA checkpoint and boarded a flight to Guatemala.

Employee's Death Deemed Preventable

OSHA has cited International Paper for willful, repeated, and serious safety violations.

Back to the Future

Part 3: Back to the Future

Bolting on security after the fact is always more costly, time consuming and less effective.

Android Security Flaw Leaves 950 Million Phones Vulnerable

Android Security Flaw Leaves 950 Million Phones Vulnerable

The devices can be hacked using a simple MMS message.

Industry Mourns Passing of Frank DeFina

Industry Mourns Passing of Frank DeFina

Heavy hearts in the sudden passing of a highly-respected security industry professional.

Why Families Prefer Prevention over Reaction When it Comes to Home Security

Why Families Prefer Prevention over Reaction When it Comes to Home Security

Protection matters, but it has to start beyond the front door.

FireVu Achieves FM Approval Certification

Early fire detection for high-value assets, used on more that 200 sites worldwide.

Father and Son Argument with TSA Agent Caught on Film

Father and Son Argument with TSA Agent Caught on Film

Smartphone used to record pat-down process and the exchange of unpleasantries.

Your Home Just Got a Whole Lot Smarter

SwannOne now available for complete control of security, temperature, lighting and more from the palm of your hand, anywhere in the world.

Upgrade with Adams Rite at ALOA 2015 Security Expo

Company highlighting electrified options that are simple to install and result in vastly improved access control.

Mission 500 Goes to Bat for Children in Need

Industry softball game event to help raise money for needy children in U.S.

victor Video Management System Eliminates Manual Case Management to Save Time

Operators can now manage events and create incident reports with a few simple clicks.

March Networks adds New Time Saving Capabilities and Redesigned Interface

Free mobile app helps integrators work more efficiently and reduce service costs.

OnSSI Names Tech Reps as New Manufacturers Representative

To help facilitate growth in Central and Southern Illinois, Iowa, Kansas, Missouri, and Nebraska.

Radio Physics Announces Handheld Version of Innovative MiRTLE Standoff Threat Detection System

Capable of detecting concealed threat items such as suicide vests, martyrdom belts, handguns, knives, and 3D-printed weapons at stand-off distances.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3