Top Stories


ComNet Adds New North American Partner

ComNet Communication Networks of Danbury, Conn., manufacturer of fiber optic transmission and networking equipment, has been selected by the Talk-A-Phone Company to supply fiber optic media converters and EoVDSL modems (Ethernet over Very High Digital Subscriber Link) for use with their line of VOIP-500 Series of Voice-over-IP phones.

Grandstream Interoperability of GXV IP Video Cameras with Bluecherry Digital Video Recording

Grandstream Networks, manufacturer of IP voice/video telephony and video surveillance solutions, and Bluecherry, an Ubuntu Linux-based surveillance application that supports both IP and analog cameras, recently announced the successful completion of interoperability testing between Grandstream’s ONVIF-compliant IP video surveillance cameras and Bluecherry’s DVR software.

Detroit Public Schools Uses Absolute Software to Help Dismantle Organized Criminal Ring

Absolute Software Corporation (Absolute), provider of firmware-embedded endpoint security and management solutions, has identified Detroit Public Schools (DPS), as a national leader in using secure asset tracking software to help recover stolen educational technology equipment.

The Newark Police Department and SW24 in Landmark Partnership to Combat Crime At No Taxpayer Expense

The Newark Police Department and SecureWatch 24, a New York City-based security company with a Network Operations Center located in Moonachie, N.J., are partnering in an unprecedented relationship to combat local crime by allowing the police access to SW24 customer video recordings.

D-Link Joins Forces with Tri-Ed Northern Video to Offer IP Surveillance Solutions

D-Link, the cost-effective, standards-based unified networking solutions provider for small business and medium enterprise IT environments, recently announced a partnership with Tri-Ed / Northern Video, North American independent security distributor.

U.S. Air Force, Lockheed Martin Complete Environmental Testing of the Nation's Next Missile Warning Satellite

Lockheed Martin has successfully completed thermal vacuum testing of the U.S. Air Force's second Space Based Infrared System geosynchronous satellite.

Online Buyers Beware: Typosquatters Want Your Information

Beware of holiday shopping at "WallMatt," "Appple" or "BestBuyh," amongst others.

Under-the-radar Cities Hold Opportunities for Security-cleared Professionals in Search of Jobs

Security-cleared professionals looking for new positions or a soft landing as they transition out of the military will find a growing number of job opportunities from coast to coast in defense cities currently "flying under the radar".



Mission 500 Launches Security-Supported Media Campaign

For the first time, Mission 500’s media partners have joined in offering their support in a monetary form totaling more than (U.S.) $125,000 in print and electronic media placements to support this important cause.

Some Smartphone Models More Vulnerable to Attack

New research from North Carolina State University shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making them more vulnerable to attack. Android has the largest share of the smartphone market in the U.S.

Test Your Cryptology Skills with NSA's New Crypto Mobile Game App

NSA's CryptoChallenge game challenges young adults to decode hundreds of puzzles.

Newark Police Department to Combat Crime at No Taxpayer Expense

The Newark Police Department and SecureWatch 24 are partnering in an unprecedented relationship to combat local crime by allowing the police access to SW24 customer video recordings.

National Bulk Cash Smuggling Center Expands Operations

To fight transnational organized crime, the U.S. Immigration and Customs Enforcement's National Bulk Cash Smuggling Center has expanded its operations center to enhance efforts to combat bulk cash smuggling.

New NIST Biometric Data Standard adds DNA, Footmarks for Enhanced Fingerprint Descriptions

The National Institute of Standards and Technology (NIST) published a revised biometric standard in November 2011 that vastly expands the type and amount of information that forensic scientists can share across their international networks to identify victims or solve crimes.

Monitronics Named a Top Place to Work

The Dallas Morning News has named Monitronics, one of the nation's largest, fastest-growing alarm monitoring companies, one of the 2011 Top 100 Places to Work in Dallas-Fort Worth.

WatchGuard Unveils Top 10 Security Predictions for 2012

WatchGuard Technologies' security analysts provide their 2012 security predictions.

Study: Attacks, Plots by Homegrown Terrorists in the United States Have Increased

Over the past decade, attacks and plots by homegrown terrorists in the United States have increased, the work of extremists from across the political spectrum -- roughly 40 percent of it by so-called "lone wolf," non-aligned actors.

Infinova Announces Acquisition of March Networks

Infinova (Canada) Ltd., a subsidiary of majority U.S.-owned Infinova, a global provider of complete video surveillance solutions headquartered in Monmouth Junction, N.J., has entered into an agreement to acquire March Networks Corporation, a provider of intelligent IP video solutions and the market leader in DVR/NVR sales in the U.S., based in Ottawa, Ontario, for approximately $90.1 million Canadian.

'Tis the Season to Shred Your Confidential Files

In the rush of the holiday season it can be easy to put aside important day-to-day tasks like information management and security.

San Diego BEST Combats Human Smuggling and Trafficking

Every day, human smuggling and trafficking groups like the CARLOS human smuggling organization attempt to illegally bring people across U.S. borders.

Offshore Rigs and Coastal Energy Terminals to Receive Underwater Security Systems

DSIT Solutions Ltd., a subsidiary of Acorn Energy, has received its largest order ever for underwater security systems.

'Tis the Season to Shred Your Confidential Files

In the rush of the holiday season it can be easy to put aside important day-to-day tasks like information management and security. But keeping records organized and properly disposing of documents is key to protecting your valuable information.

Evading Surveillance on Reality TV

In a world driven by technological advancements that include mobile monitoring and 24/7 surveillance, the idea of disconnecting from Big Brother seems relatively impossible.

Evading Surveillance on Reality TV

In a world driven by technological advancements that include mobile monitoring and 24/7 surveillance, the idea of disconnecting from Big Brother seems relatively impossible.

Honeywell Appoints Scott Harkins to Lead Security Business in the Americas

Honeywell International, a Fortune 100 diversified technology and manufacturing provider recently appointed an industry veteran to manage extensive intrusion, video and access portfolio.

Two Shot Dead at Virginia Tech, Police Search for Suspect

Virginia Tech is in the midst of a lockdown after university officials said two people, including a campus police officer, were shot and killed shortly after noon today.

Largest u-School Project in Korea Using Firetide 802.11n Wireless LAN for Ubiquitous Internet Access

The Seoul Metropolitan City Office of Education (SOME) recently deployed a high-performance Firetide Wireless LAN (WLAN) communications infrastructure across three school campuses in Seoul, Korea.

HID Global Helps Beijing Metro Ensure Safety at One of China's Busiest Transit Systems

The centralized, Web-based access control system safeguards passengers and staff at Beijing Metro’s Fangshan Line.

Report: Despite Economic Uncertainty, Outlook for Video Surveillance Market Remains Strong

While the worst of the first global recession has subsided, another, potentially larger and deeper downturn looms on the horizon. Despite this fairly terrifying specter, IMS Research remains confident that demand for CCTV and video surveillance equipment will remain strong through 2012 -- growth for network video surveillance equipment sales is forecast to exceed 25 percent.

RSA Shuts Down More Than 500,000 Cyber Attacks Across 185 Countries

RSA FraudAction anti-phishing and anti-Trojan service recently reached a milestone in the fight against cyber crime. The service shut down its 500,000th online attack on behalf of its global customers and, to date, has helped them prevent an estimated US$7.5 billion in potential fraud losses.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3