Top Stories


How did the Terrorist Attacks in Norway Change the Country?

Three social scientists at the University of Stavanger sought to answer this question.

U.S. Education Department Announces New Measures to Safeguard Student Privacy

The U.S. Department of Education announced new regulations to safeguard student privacy while giving states the flexibility to share school data that can be helpful in judging the effectiveness of government investments in education.

ASIS International Receives Certification for Lead Auditor Training

The program covers ISO, ANSI and BSI standards for resilience, security, crisis, continuity and recovery management, as well as the PS-Prep Program. RABQSA International, the world’s largest personnel and training certification body, establishes competence-based requirements for training programs for ISO and other standards.

Network Video Surveillance Sales are on the Right Track

The transition from analogue video surveillance equipment to network video surveillance equipment is forecast to drive growth of more than seven percent for the mobile video surveillance equipment market in trains and trams, over the next five years.

Real World Opportunities

Real World Opportunities

With smart functions incorporated into today’s network video cameras, images can be analyzed before they leave the camera, which can then trigger an alarm or relay other data to enable a system-wide response.

There Are Heroes Among Us

Clark Kent was mildmannered and unassuming, yet, when needed, he became a hero, saving those at risk, the poor and downtrodden. Better known as Superman, he was, at least in the comic books, one person among us who simply did his job, often without fanfare or glamour.

Securitys Range and Capabilities

Security's Range and Capabilities

The mobility and convenience offered by handheld devices has caught the attention of manufacturers and integrators, who are now marketing numerous security solutions.

12 Days of Christmas

12 Days of Christmas Surveillance Style

From Black Friday all the way through the returns season, the sheer uptick in shoppers during the holiday season is daunting for retailers of any size.



World Class Security

World Class Security

Dallas, Texas, considers itself a world-class city. Whatever the qualifications, the arts district in the city is certainly world class, and, therefore, the security must also meet high-caliber specifications.

Department of Air Force Certification Grants Vindicator Authority to Operate Critical Asset Security on USAF Networks

Honeywell’s portfolio of Vindicator security technology, which is used to protect critical-infrastructure facilities across the globe, achieved a major milestone by being certified for use on U.S. Air Force data networks.

The Complexity of Mass Notification

The Complexity of Mass Notification

To better understand what is needed and the current state of mass notifications, Siemens undertook a detailed analysis of U.S. colleges and universities, taking a hard look at information provided to the government as part of the Clery Act. The company released the results in October in a white paper.

The Logistics of Security

The Logistics of Security

Navarre Corp., a distribution and retail support operation in Minneapolis, previously relied on an analog-based surveillance system as a way to increase security and aid in investigations, but the company found the system unreliable for capturing high-quality video when incidents occurred.

Protecting Naval Ordnance

Protecting Naval Ordnance

The Naval Ordnance Test Unit (NOTU) at the Cape Canaveral, Fla., Air Force Station supports and tests sea-based weapons in a safe environment.

Mob Mentality

Mob Mentality

’Tis the season to be jolly, especially if you’re a retailer. For most stores, the cash registers are ca-chinging more this month than they have all year.

Aviation Soars with Security

Aviation Soars With Security

This year’s EAA AirVenture 2011 in July drew close to 550,000 visitors during the seven-day event—members, fans and spectators who came to see daily aviation shows, aerobatics and pyrotechnics, as well as the opening day Fly-In Theater.

Aggressively Priced Clouds

Aggressively Priced Clouds

A lower-cost virtual infrastructure gives cloud providers pricing leeway that can be used either to beat a competitor’s price or to increase margins.

Iconic Shanghai

Iconic Shanghai

Shanghai WorldExpo Culture Center, shaped like a flying saucer—and often referred to as the “Spaceship”—is one of Shanghai’s iconic buildings.

Trends in Video Surveillance

Trends in Video Surveillance

The transition from analog CCTV equipment to network video surveillance equipment continues to be the major overarching trend within the video surveillance industry.

Outsourcing Access Control

Mike Flannery, director of commercial hardware solutions of ADT Commercial Security, discusses the three types of access controls, and how users can determine which solution is best for their business.

Study: Cyber Attackers Think Like Regular Crooks

Researchers are applying criminological concepts in the study of cybercrime.

Bear Creek Mountain Resort Ensures Guest Safety with Avigilon Surveillance System

Bear Creek Mountain Resort replaced its analog-based surveillance system with the Avigilon high-definition surveillance solution for greater reliability, enhanced image quality, and the ability to more efficiently and quickly resolve incidents onsite.

Engineers Developing Military Applications for Smartphones

Engineers from the MU College of Engineering, with funding from the U.S. Army/Leonard Wood Institute, have enhanced popular smartphones to be able to find and track targets.

Stress Response in Police Officers May Indicate Risk for PTSD

Stress-related disorders are often linked to people working in the line of fire.

Department of Homeland Security Logo

CFATS Update The Pre-Authorization and Authorization Inspections

In October 2006, the Department of Homeland Security Appropriations Act of 2007 became law. Section 550 of the Act ordered the Department of Homeland Security (DHS) to...

ICE Seized 150 Websites that were Illegally Selling, Distributing Counterfeit Merchandise

This operation is the eighth phase of Operation In Our Sites, a sustained law enforcement initiative to protect consumers by targeting counterfeit and piracy on the Internet, and the second year it has coincided with Cyber Monday.

A Holistic Approach to CFATS Compliance

Knowing the identity of workers and monitoring their access to various operations are key capabilities required to meet Chemical Facility Anti-Terrorism Standards (CFATS). Several of the Department of Homeland Security (DHS)'s 18 Risk-Based Performance Standards (RBPS), which were formulated to ensure protection of chemical facilities, specifically mention the need for comprehensive monitoring of employee identity and control of access to critical areas.

Feds Seize 9 Tons of Marijuana Near Otay Mesa Border Crossing

Seven individuals have been charged in federal court with drug smuggling following the discovery of more than 9 tons of marijuana inside a tractor trailer attempting to enter the United States at the Otay Mesa Commercial Port of Entry.

Norwegian Study Finds Opening Bars Longer Increases Violence

Small changes in pub and bar closing hours seem to affect the number of violent incidents.

Technology's Role in Achieving Chemical Security Standards

The U.S. Department of Homeland Security developed the Chemical Facility Anti-Terrorism Standards (CFATS), a comprehensive set of security regulations governing chemical facilities, to ensure companies that manufacture, store and transport chemicals are properly secured. While various technologies can play a role to protect chemical facilities, CFATS does not specify which should be used or how. Instead, CFATS specifies 18 Risk-Based Performance Standards (RBPS) to guide chemical facilities in selecting and implementing appropriate protective measures to reduce vulnerability and manage risk.

Marriott Hacker Pleads Guilty for Extorting Employment from the Company

A Hungarian citizen pleaded guilty today to intentionally causing damage by transmitting a malicious code to Marriott International Corporation computers and to threatening to reveal confidential information obtained from the company’s computers if Marriott did not offer him a job.

Featured

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

  • Human Risk Management: A Silver Bullet for Effective Security Awareness Training

    You would think in a world where cybersecurity breaches are frequently in the news, that it wouldn’t require much to convince CEOs and C-suite leaders of the value and importance of security awareness training (SAT). Unfortunately, that’s not always the case. Read Now

  • Windsor Port Authority Strengthens U.S.-Canada Border Waterway Safety, Security

    Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3