Top Stories


Security Issues to Escalate as BYOD Trend Continues

A new report from Juniper Research has found that the number of employee owned smartphones and tablets used in the enterprise will more than double by 2014, reaching 350 million by 2017, compared to almost 150 million this year.

Gunnebo Wins Major Order for Access Control in Riyadh, Saudi Arabia

“We chose Gunnebo since its products comply with the Aramco Functional Specification Document. The products are required to be high-quality in design and easy to maintain,” states Engr. Ihab N. Gazawi, Security Systems Engineer, Saudi Business Machines Ltd.

Cayman and FLIR Help Law Enforcement Battle Designer Drugs

Cayman Chemical and FLIR Systems have come together to provide law enforcement with a powerful new tool in the battle against designer drugs by using Cayman Chemical’s forensic standards to create a Mass Spectral Library for FLIR’s Griffin 460 transportable Gas Chromatograph Mass Spectrometry (GC/MS) system.

Proximex Integrates with Elpas to Enable Single Platform Security Management

Proximex will integrate its Surveillint solution with the Elpas (formerly Visonic Technologies) Eiris Server on the Eiris Integration Module.

Copper Tubing Thieves Caught in the Act

Thieves cutting copper tubing from a two-story office building’s rooftop air conditioner early on a July morning quickly found themselves in jail – after a Sonitrol audio detection alarm system detected their footsteps and alerted Sunrise Police.

Raytheon Awarded $53 Million to Advance Dual Band Radar Development

Raytheon Company has been awarded two U.S. Navy contracts for the Dual Band Radar, the multimission air defense radar for the future USS Gerald R. Ford (CVN 78), America's next-generation aircraft carrier.

New Fire Protection Essential

Texas Children’s Hospital recently added a new high-rise facility, the Pavilion for Women, to its already impressive five-building campus in the heart of the Texas Medical Center in Houston.

Be Prepared in Case of Disaster

When severe tornadoes struck six Southern states in April 2011, the ensuing crisis tested the mettle of emergency responders



Peace of Mind

We have all heard of “tightening the belt” in tough economic times, but few can relate as well as the multitude of private, not-for-profit organizations that rely on public and private donations and grants for their annual budget.

Dissecting The Layers

When people talk about layered physical security, they often think it involves having more than one security device at a particular point on their property.

Circle The Wagons

As the first line of defense, perimeter security is often the initial focus: physical barriers, deterrent strategies, access control and intrusion detection systems, ground sensors and street patrols.

Providing Security

IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.

Increased Card Security

Protecting the physical integrity of personal and corporate information is an important task for Banco do Nordeste do Brazil (BNB), which goes above and beyond the security rules established by the Central Bank of Brazil to adopt additional security measures.

Safer More Secure Campuses

To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.

Study: Conciliatory Tactics More Effective Than Punishment in Reducing Terrorism

Policies that reward abstinence from terrorism are more successful in reducing such acts of violence than tactics that aim to punish terrorists, suggests a new study in the August issue of the American Sociological Review.

Boosting Identity

Today, decision makers can raise the bar on enterprise security without raising the complexity for their users.

Cell Phone Financial Identity Theft

USA Today reported in March 2012 that Americans lost $30 billion worth of mobile phones last year.

Cost-Effective Compliance

The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.

Curbside Security

Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.

From the IT Perspective

Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.

Historic Theater Add System Sensor Fire Detector

In 2010, the historic Egyptian Theatre in DeKalb, Ill., decided to upgrade to a more modern and effective life safety system to protect the structure and its patrons.

Todays Threat Landscape

Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.

Video Provision

After recommending strategies for on-the-border video cameras and other security technologies, Rep. Candice Miller (R-MI) and her colleagues in the U.S. House of Representatives have passed H.R. 1299, known as the Secure Border Act.

HID Global's Access Control Solution Safeguards China Hospital

First Affiliated Hospital of Jinan University in Guangzhou, China has selected HID Global's networked access control solutions and contactless readers to provide multi-layered security with advanced access control level settings and centralized monitoring to improve the hospital’s overall security in key access zones.

ITT Exelis to Provide Cyber Solutions Development for U.S. Air Force

ITT Exelis (NYSE: XLS) has been awarded the Agile Cyber Technologies (ACT) indefinite delivery, indefinite quantity contract by the U.S. Air Force Research Laboratory (AFRL).

Diebold Extends Monitoring Expertise to Regions Financials

Birmingham, Ala.-based Regions Financial Corporation, a full-service provider of banking, wealth management, mortgage and insurance solutions in the United States, has turned staffing of its in-house central monitoring station over to Diebold.

Lenel and Mercury Security Sign Contract for Access Control Hardware

Mercury Security Corporation has signed a long-term contract with Lenel Systems to provide access control hardware for use with the Lenel OnGuard® Total Security Platform.

CACI Awarded $261 Million in Intelligence Contracts

CACI International Inc. has been awarded more than $261 million in previously unannounced contracts with federal government clients in the Intelligence Community.

VIVOTEK Cameras Guard City of Halle, Belgium

In order to meet numerous complex technical specs and requirements for the Healle, Belgium surveillance project, many different types of cameras were sought after. Some of the challenges facing the VIVOTEK teams and system integrator included varying lighting conditions at the station, from dimly lit parking lots, to outdoor entrances, interior corridors and a jail.

Bosch Supplies Security Solution for Luxury Apartment Project in Vietnam

With 750 modern apartments spread over five 28-story buildings, Vietnam’s first luxury residential project, the Vista in Ho Chi Minh City, is the result of investments totalling $200 million. The developers turned to Bosch Security Systems when it came to ensuring the safety of the occupants and facilities.

Featured

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

  • Human Risk Management: A Silver Bullet for Effective Security Awareness Training

    You would think in a world where cybersecurity breaches are frequently in the news, that it wouldn’t require much to convince CEOs and C-suite leaders of the value and importance of security awareness training (SAT). Unfortunately, that’s not always the case. Read Now

  • Windsor Port Authority Strengthens U.S.-Canada Border Waterway Safety, Security

    Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3