Top Stories


Diamond in the Rough

Though the thief stole thousands of dollars worth of jewelry, the Calderons were just thankful to be alive.

Tap Into Security Remotely

Organizations whose operations span cities, countries and even continents face formidable challenges in their efforts to secure people, property and assets.

What The Glock

Come and listen to the story of an Austrian named Glock, He and wife, Helga, made curtain rods in their shop, Then one day he invented a new handgun, And the Austrian army said, “We gotz to have us one.” Glock, that is. Lightweight. Model 17. Well, the first thing you know ol’ Glock’s a billionaire, Kinfolk said, “Gast’, export it away from there!” Said, “USA is the place it oughta be.” So he marketed it abroad to frontline security. The police, that is—needing new fire power.

Securing the Global Trade Market

Advances in communication technology, trade barriers and production cost reductions have furthered global capital markets and provided new economic opportunities.

Growth in SaaS, Mobile Applications Increases Requirement for Software Security Testing at Scale

Veracode Inc. recently announced the availability of a whitepaper, ‘Outsourcing the problem of software security’, produced by primary research and analysis company, Quocirca.

Alarm Protocol

Many people—even within the security industry—may be surprised to learn how traditional alarm dispatches work. It can be a lengthy process.

Study: Encryption Critical to Increase Security Posture

Thales, provider of information systems and communications security, recently announced the publication of the 2011 Global Encryption Trends Study.

Upgrading To A New Era

In order to allow an all-IP-based services platform, service providers are upgrading existing networks and migration strategies.



Cloud Security Alliance Launches Mobile, Innovation Initiatives

The Cloud Security Alliance (CSA) recently announced two significant new initiatives for 2012, addressing growing areas of need in cloud security -- mobile computing and innovation.

HID Global Demonstrates First Single-Provider Solution for Physical-Logical Access

HID Global recently announced its highly-integrated fraud detection service from its Identity Assurance business, ActivIdentity.

Sophisticated and Strategic

Mission-critical facilities such as data and telecommunications centers must maintain operations without interruption.

Eyes Wide Open

The Port of Portland services more than 800 vessel calls each year, accounting for more than 14 million tons of ocean-going cargo.

Anything But Old School

Among Austin Independent School District’s top-stated values are excellence and the health and safety of its students, and it shows.

Charity Organization Awards Security Companies for Humanitarian Contributions

Mission 500, a charitable organization engaging security professionals to sponsor needy children through the World Vision organization, recently announced the winners of its annual Humanitarian and Corporate Social Responsibility (CSR) awards. The awards are designed to honor companies in the security industry who make important contributions to those in need.

Simple is Smart

Security takes on a new perspective when looking at the IT side of the aisle. After my first day through the RSA Conference in San Francisco, I have to say Cherry’s FIPS 201 compliant keyboard makes simple look pretty smart.

ASIS International Addresses Violence in Schools

In the wake of the recent active-shooter tragedy in Ohio, ASIS International (ASIS), the largest organization for security management professionals worldwide, is delivering a 60-minute webinar entitled “Reducing Risk of Violence in Schools” on Friday, March 2, 2012 at 12:00 p.m. Nationally acclaimed school security expert Paul Timm, PSP will be the featured speaker.

Retirement Community Village Secure with Megapixel Cameras

For the older population, the security and comfort provided by retirement living communities makes them an attractive option. At St. Andrews Village in Auckland, New Zealand, the comfort is provided in a world-class multi-option residential facility and the security is provided by Arecont Vision megapixel camera technology.

Three-strikes Law Fails to Reduce Crime in California

California’s three-strikes law has not reduced violent crime, but has contributed significantly to the state’s financial woes by substantially increasing the prison population, according to a University of California, Riverside researcher.

Survey Highlights Webmasters' Struggles with Hacked Sites

StopBadware and Commtouch recently published a joint report titled "Compromised Websites: An Owner's Perspective" that chronicles webmasters' experiences with hacked websites. The report presents statistics and opinions on how site owners navigate the process of learning their sites have been hacked and repairing the damage.

NQ Mobile

Report Identifies Top Three Malware Threats for 2012

A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.

Damballa Discovers Advanced Evasion Techniques Being Used by Six Crimeware Families

Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.

Unintentional Exposure of Corporate Data Through Theft, Loss of Removable Devices Examined in Survey

Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.

Alta dt Data Technologies

IntervalZero and Alta Data Technologies Form Avionics Partnership

The partnership will allow customers to easily develop real-time MIL-STD-1553 and ARINC applications for Windows platforms.

Registration Now Open for ESX 2012 in Nashville

Security industry members anxious to attend the 2012 Electronic Security Expo (ESX) event in Nashville, Tenn., now have the opportunity to lock-in early bird rates. Members of the industry can register here for the event, being held June 25-29.

Shawnee County Department of Corrections Deploys High-Definition Surveillance System

The Shawnee County Department of Corrections (SNDOC) in Topeka, Kan., deployed a new high-definition surveillance system to heighten security, expedite investigations, and ultimately, improve inmate behavior.

White Paper Examines Certificate Management Challenges and Entrust

With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.

Identity Fraud Rose in 2011

The 2012 Javelin Strategy & Research Identity Fraud Report shows that the number of identity fraud incidents increased by 13 percent in 2011, totaling 11.6 million adult victims. The report also found that certain social media behaviors and increasing number of data breach incidents contributed to the overall amount of identity fraud instances in the United States over the past year.

DHS and The Netherlands Sign Cybersecurity Agreement

Secretary of Homeland Security Janet Napolitano, Dutch Minister of Security and Justice Ivo Opstelten recently signed a Letter of Intent to build upon cooperative cybersecurity initiatives to promote a safe, secure and resilient cyber environment.

Featured

  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 2 Recap

    Day 2 was another winner at GSX 2024 in Orlando. Aisles and booths were packed with attendees looking at some of the new and latest security technology. Remember to follow the GSX Live page from Security Today, as well as SecurToday on X and Security Today on LinkedIn to find out more about what’s happening on the show floor during tomorrow’s final day. Here’s what was happening with all four of our partners during the event on Tuesday. Read Now

    • Industry Events
    • GSX

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3