Top Stories


Diamond in the Rough

Though the thief stole thousands of dollars worth of jewelry, the Calderons were just thankful to be alive.

Tap Into Security Remotely

Organizations whose operations span cities, countries and even continents face formidable challenges in their efforts to secure people, property and assets.

What The Glock

Come and listen to the story of an Austrian named Glock, He and wife, Helga, made curtain rods in their shop, Then one day he invented a new handgun, And the Austrian army said, “We gotz to have us one.” Glock, that is. Lightweight. Model 17. Well, the first thing you know ol’ Glock’s a billionaire, Kinfolk said, “Gast’, export it away from there!” Said, “USA is the place it oughta be.” So he marketed it abroad to frontline security. The police, that is—needing new fire power.

Securing the Global Trade Market

Advances in communication technology, trade barriers and production cost reductions have furthered global capital markets and provided new economic opportunities.

Growth in SaaS, Mobile Applications Increases Requirement for Software Security Testing at Scale

Veracode Inc. recently announced the availability of a whitepaper, ‘Outsourcing the problem of software security’, produced by primary research and analysis company, Quocirca.

Alarm Protocol

Many people—even within the security industry—may be surprised to learn how traditional alarm dispatches work. It can be a lengthy process.

Study: Encryption Critical to Increase Security Posture

Thales, provider of information systems and communications security, recently announced the publication of the 2011 Global Encryption Trends Study.

Upgrading To A New Era

In order to allow an all-IP-based services platform, service providers are upgrading existing networks and migration strategies.



Cloud Security Alliance Launches Mobile, Innovation Initiatives

The Cloud Security Alliance (CSA) recently announced two significant new initiatives for 2012, addressing growing areas of need in cloud security -- mobile computing and innovation.

HID Global Demonstrates First Single-Provider Solution for Physical-Logical Access

HID Global recently announced its highly-integrated fraud detection service from its Identity Assurance business, ActivIdentity.

Sophisticated and Strategic

Mission-critical facilities such as data and telecommunications centers must maintain operations without interruption.

Eyes Wide Open

The Port of Portland services more than 800 vessel calls each year, accounting for more than 14 million tons of ocean-going cargo.

Anything But Old School

Among Austin Independent School District’s top-stated values are excellence and the health and safety of its students, and it shows.

Charity Organization Awards Security Companies for Humanitarian Contributions

Mission 500, a charitable organization engaging security professionals to sponsor needy children through the World Vision organization, recently announced the winners of its annual Humanitarian and Corporate Social Responsibility (CSR) awards. The awards are designed to honor companies in the security industry who make important contributions to those in need.

Simple is Smart

Security takes on a new perspective when looking at the IT side of the aisle. After my first day through the RSA Conference in San Francisco, I have to say Cherry’s FIPS 201 compliant keyboard makes simple look pretty smart.

ASIS International Addresses Violence in Schools

In the wake of the recent active-shooter tragedy in Ohio, ASIS International (ASIS), the largest organization for security management professionals worldwide, is delivering a 60-minute webinar entitled “Reducing Risk of Violence in Schools” on Friday, March 2, 2012 at 12:00 p.m. Nationally acclaimed school security expert Paul Timm, PSP will be the featured speaker.

Retirement Community Village Secure with Megapixel Cameras

For the older population, the security and comfort provided by retirement living communities makes them an attractive option. At St. Andrews Village in Auckland, New Zealand, the comfort is provided in a world-class multi-option residential facility and the security is provided by Arecont Vision megapixel camera technology.

Three-strikes Law Fails to Reduce Crime in California

California’s three-strikes law has not reduced violent crime, but has contributed significantly to the state’s financial woes by substantially increasing the prison population, according to a University of California, Riverside researcher.

Survey Highlights Webmasters' Struggles with Hacked Sites

StopBadware and Commtouch recently published a joint report titled "Compromised Websites: An Owner's Perspective" that chronicles webmasters' experiences with hacked websites. The report presents statistics and opinions on how site owners navigate the process of learning their sites have been hacked and repairing the damage.

NQ Mobile

Report Identifies Top Three Malware Threats for 2012

A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.

Damballa Discovers Advanced Evasion Techniques Being Used by Six Crimeware Families

Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.

Unintentional Exposure of Corporate Data Through Theft, Loss of Removable Devices Examined in Survey

Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.

Alta dt Data Technologies

IntervalZero and Alta Data Technologies Form Avionics Partnership

The partnership will allow customers to easily develop real-time MIL-STD-1553 and ARINC applications for Windows platforms.

Registration Now Open for ESX 2012 in Nashville

Security industry members anxious to attend the 2012 Electronic Security Expo (ESX) event in Nashville, Tenn., now have the opportunity to lock-in early bird rates. Members of the industry can register here for the event, being held June 25-29.

Shawnee County Department of Corrections Deploys High-Definition Surveillance System

The Shawnee County Department of Corrections (SNDOC) in Topeka, Kan., deployed a new high-definition surveillance system to heighten security, expedite investigations, and ultimately, improve inmate behavior.

White Paper Examines Certificate Management Challenges and Entrust

With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.

Identity Fraud Rose in 2011

The 2012 Javelin Strategy & Research Identity Fraud Report shows that the number of identity fraud incidents increased by 13 percent in 2011, totaling 11.6 million adult victims. The report also found that certain social media behaviors and increasing number of data breach incidents contributed to the overall amount of identity fraud instances in the United States over the past year.

DHS and The Netherlands Sign Cybersecurity Agreement

Secretary of Homeland Security Janet Napolitano, Dutch Minister of Security and Justice Ivo Opstelten recently signed a Letter of Intent to build upon cooperative cybersecurity initiatives to promote a safe, secure and resilient cyber environment.

Featured

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

  • Gun Violence Report Finds Retail Spaces, K-12 Schools Most Targeted

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, today announced the release of its annual Gun Violence Report, offering a deep dive into the landscape of gun-related incidents across the United States. This analysis extends beyond mass fatality events, providing a more nuanced understanding of when, where, and why shootings occur. Read Now

  • Agentic AI Will Revolutionize Cybercrime in 2025 According to New Report

    Malwarebytes, a provider in real-time cyber protection, recently released its 2025 State of Malware report, which reveals insight into the emergence of agentic artificial intelligence (AI), plus the year’s most prominent threats and cybercrime tactics. The report details a significant uptick in the number of known ransomware attacks, the total value of ransoms paid in 2024, and how IT teams can address them. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities