Top Stories


AT&T Offers Help to Customers Affected by Breach

AT&T Offers Help to Customers Affected by Breach

Total number affected still unknown, but company to offer free credit monitoring.

UK Government Admits Spying Using Google, Facebook, Twitter

UK Government Admits Spying Using Google, Facebook, Twitter

What it all boils down to is internal vs. external cyber communications.

Android Smartphones House Pre-installed Spyware

Android Smartphones House Pre-installed Spyware

Integrated with the smartphone's firmware, it is impossible to remove or disable the malicious app.

Samsung Techwin and Convergint Technologies Announce Strategic Partnership Agreement

Complementary solution delivers industry's top-rated systems.

IFSEC 2014 Opens its Doors to the Security and Fire Industry

IFSEC 2014 Opens its Doors to the Security and Fire Industry

A quick tour through this event shows that there is something for everyone.

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Crime doesn't discriminate against size; small businesses are typically most vulnerable with fewer resources to guard against it.

Benefits of Key Control are Focus for Morse Watchmans at IFSEC 2014

Key control and management solutions offer state-of-the-art security.

Tri Ed Acquires SecurityPro Warehouse

New Orleans branch moving into 10,000 square foot facility.



Drones: The Future of Bonding with Your Neighbors

Drones: The Future of Bonding with Your Neighbors

Skyteboard 3G, an iOS and Android app-controlled drone, could help facilitate interaction in local communities. (Video Included)

Bitcoin Makes a Come Back to Apple App Store

Bitcoin Makes a Come Back to Apple App Store

As unregulated virtual currencies make their way back into iOS devices, what type of security issues will develop?

GovSec 2014 Attendance Grows 20 Percent

GovSec – the Government Security Conference and Expo, which featured TREXPO, the Law Enforcement Expo, and was held in conjunction with CPM East – saw its conference grow by 20 percent and total attendance reach more than 3,600 in 2014.

STANLEY Security transfers Sonitrol-branded Product Development to 3xLOGIC Inc

Goal is to bring combined strengths of both companies to the development and delivery of the brand.

Morse Watchmans Key Control Systems Improve Security at Wyndham Hamilton Park

KeyWatcher Systems ensure accountability for keys and essential communication devices.

Canon acquires Milestone to Make Major Advance in Network Video Surveillance Business

New combination will create formidable player in market by combining the strengths of Canon’s imaging technology with Milestone’s video management software.

Hacker Behind Bars for Revealing Ex-President’s Bathroom Art

Hacker Behind Bars for Revealing Ex-President’s Bathroom Art

Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.

Combining Technology and People to Increase Security and Awareness

Combining Technology and People to Increase Security and Awareness

4 elements that must be included in a security strategy to gather information from a variety of sources to create heightened security within an organization.

Open University Campuses Do Not Have to Be a Security Nightmare

Open University Campuses Do Not Have to Be a Security Nightmare

How three security professionals in the education vertical are keeping their campuses safe and secure for all.

New Chinese Military Cyberattacks Discovered

New Chinese Military Cyberattacks Discovered

Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.

The Biometric Card - Next Evolution for ID Cards

The Biometric Card - Next Evolution for ID Cards

ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.

Types of Passwords Hackers Use for Their Own Accounts

Types of Passwords Hackers Use for Their Own Accounts

Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?

Smart Hoodie Could Add New Layer of Security

Smart Hoodie Could Add New Layer of Security

GSM radio sewn into sweatshirt allows different gestures to trigger different text messages to be sent to smartphone contact.

SecurityTronix Announces Free Download of Advanced Mobile App

Designed for company's DVRs and Hybrid DVR standalone recorders to allow more control of surveillance system in palm of users hand.

Privacy Concerns about Student Data Meets Big Parents

Privacy Concerns about Student Data Meets Big Parents

Parents of school children are standing up against Big Data when it comes to their children's personal information.

DRS Technologies' WatchMaster Thermal Camera Portfolio Now Available On Leading Building Design Software System

DRS Technologies Inc., a Finmeccanica Company, announced recently that its WatchMaster thermal camera specifications will be available to building designers using Autodesk Seek, a leading Building Information Modeling (BIM) web application accessible to Autodesk Revit users.

School Bully Changes His Ways with the Help of His Parents

School Bully Changes His Ways with the Help of His Parents

A second grader at Tournament Hills Elementary in Beaumont, California demonstrates what it means to go from bully to friend. (Awesome video included; a true must-see!)

Gunman Stopped by Students

Gunman Stopped by Students

Just a week before the end of the school year, a lone gunman riddles students with fear on Seattle Pacific University's campus.

How Safe are Your Secrets Online?

How Safe are Your Secrets Online?

Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.

China to Punish Google, Apple and Microsoft for Spying

China to Punish Google, Apple and Microsoft for Spying

China's People's Daily, a state-operated media outlet, promises punishments as translated by Reuters.

Scan Wallpaper to Download Ebooks

Scan Wallpaper to Download Ebooks

Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.

The Token-less Solution to Eradicating Passwords

The Token-less Solution to Eradicating Passwords

In a world where security measures are always changing, but to date, have failed to keep our identities safe, what is the best way to keep our personal material truly secure?

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3