Top Stories


Merck Pharmaceuticals Installs Arecont Vision Megapixel Cameras at Mexico Facility

Merck Pharmaceuticals has installed an Arecont Vision megapixel technology solution at their new facility in Mexico to help ensure that all activity and incidents are captured in high-resolution video.

CyberLock Develops System to Help Water Utilities Meet EPA Guidelines

CyberLock Security Systems is working to help water utilities meet EPA guidelines for protecting watersheds and sources of drinking water.

TriEd and Northern Video Distribution Partnering With VideoIQ

Tri-Ed/Northern Video Distribution is partering with VideoIQ, a leading innovator in intelligent video analytics and surveillance. .

Department of Homeland Security to Test U.S. Bridges for Vulnerability

The Department of Homeland Security’s Science and Technology Directorate (S&T) has joined forces with the Federal Highway Administration and the U.S. Army Corps of Engineers Engineer Research and Development Center to conduct series of experiments that assess potential vulnerability of critical structural components of aging steel bridges.

New Technology Could Help Thwart Nuclear Terrorism

Attacks involving nuclear devices or materials are among the terrorism scenarios that raise the most concern. For that reason, technology that can effectively detect smuggled radioactive materials is considered vital to U.S. security.

Anti-Malware Lab Report Says Four out of Five Malware Samples are Trojans

Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.

Israeli Bank Selects NICE Technology

NICE announced recently that Israeli bank, Bank Mizrahi Tefahot, selected the new NiceVision banking solution to secure its branches and ATM systems located throughout Israel. The new NiceVision banking solution captures video recordings inside branches and from ATMs for fraud detection and claim settlement, and allows for easy access and retrieval of video evidence -- supporting compliance with law enforcement requirements.

Report: Mobile Use of Social Networking Becoming Preferred Way to Infect Mobile Devices

AVG Technologies recently released its Q1 2012 Community Powered Threat Report. The report highlights the growing use of mobile devices to connect with social networks and how this is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices running Android.



Major U.S. International Airport Expands Use of Smarter Security Technology

Smarter Security Inc. recently announced that one of the country’s Top 25 largest airports recently expanded its use of the company’s Door Detective CL to better secure employee-only doors and elevators in the airport terminal.

Tips: Protect Against Fake Antivirus Programs

Antivirus programs are typically recommended by computer sales professionals, but it is important to know about fake antivirus programs and how you can protect yourself and your computer against them.

Preserving Musical Heritage

As the crown jewel of the rich artistic and cultural heritage of Rome, the Academy of Santa Cecilia is one of the oldest and most important musical institutions in the world. Its position and fame have steadily grown since it was founded in 1585. Today, it is internationally renowned, both as a venue for symphony orchestra concerts and as the custodian of a heritage of inestimable value, which makes it a landmark for academics and music lovers alike.

A Wise Investment

Monticello Bank, a 12-branch community bank in Kentucky, had an outdated analog surveillance system in place that limited capabilities and required the bank to hire a thirdparty vendor for analog video installation and maintenance services.

Rolling Out Successful Security

Securing the Past

Patna Museum is recognized as one of the greatest museums in India.

Expecting More Growth This Year

Every so often, I get lucky and find myself at the right place at the right time, hopefully doing the right things. For many years I’ve experienced this within the security industry.

Security On The Fly

How significant is the mobile application market around the world today? You just need to look at some of the numbers to understand how widespread mobile apps have become, even in the physical security market, and how adoption of mobile phones, tablets and other smart devices that are used with these apps has gone from leading-edge to commonplace.

Book Examines Research on Eyewitness Identification to Improve Criminal Justice Practice

Eyewitness evidence plays a critical role in at least 77,000 criminal cases each year in the United States, but it has become commonplace to call that evidence inaccurate. In a new book by a University of Arkansas psychologist and his colleagues, the issue of accuracy is presented as more complicated and mutable.

Mandate for Mass Notification

The parents of two former Virginia Tech students have won a $4 million jury-awarded lawsuit resulting from the deaths of their children, Erin Peterson and Julia Pryde.

Taking Off

Today’s progressively faster pace of life rationalizes the thirst for near-constant connectivity.

Security Grows With Mesa

For the past several years, Colorado Mesa University (CMU) has been growing rapidly, and its access control system has continued to grow with it.

Innovation At The Edge

Set on the edge of a ravine, the 540,000-square-foot Ontario Science Centre is the size of a large airport, with three separate buildings on different elevations that descend into the valley.

Smart Thermal Cameras

Achieving security awareness around perimeters and outdoor areas comes down to timely, credible and detailed alerts.

HID Access Control Solutions Increase Security at Power Plant in China

HID Global announced today that the company’s network access control solutions and contactless readers have been deployed at the Fuxi power plant in China’s Sichuan province. The new system provides increased security that ensures the operational safety of production and facility areas, offers real-time monitoring at the central station and enables security administrators to remotely close facility doors for improved safety management.

Des Moines Area Community College Deploys Avigilon Technology

Avigilon recently announced that Des Moines Area Community College (DMACC) in Iowa has deployed the Avigilon high-definition surveillance system to prevent unlawful activity, and boost student and staff safety.

Nebraska Photo Studio Remotely Monitors Five Locations

Video surveillance and remote monitoring company mobiDEOS Inc. announces that Arnold Clark Photography, one of the oldest and largest photography studios in Omaha, Nebraska, uses MobileCamViewer to monitor activity and protect retail interests at its downtown business location.

Research: Airport Security Spending to More Than Double in Next Six Years

Airport security remains a priority for individual countries and the international community. An increase in global air travel over the last decade has driven growth in the security industry. The persistent threat of terrorist and criminal attack as well as new regional security directives have all contributed to this trend.

Military Explores Expansion of Open Source Technology

Open source technology can help military and other government entities modify software quickly without sacrificing data security. That flexibility, coupled with lower overall cost, is helping fuel a rapid increase in government adoption of open source software, advocates say.

Security 5/2K Mission 500 Charity Run Raises More Than $95,000

The third Security 5/2K Mission 500 Charity Run in Las Vegas at ISC West raised more than $95,000 to benefit Mission 500, a charitable organization engaging security professionals to sponsor children in need through the World Vision organization.

Western Kentucky University Deploys Milestone VMS

Milestone Systems IP VMS ís proving the advantages of the open platform approach for Western Kentucky University’s diverse surveillance needs with the ability to expand and customize the system for growing requirements over the years.

Researchers Study Costs of "Dirty Bomb" Attack in Los Angeles

A dirty bomb attack centered on downtown Los Angeles’ financial district could severely impact the region’s economy to the tune of nearly $16 billion, fueled primarily by psychological effects that could persist for a decade.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.