Top Stories


The Remote Red Room: The First Defense in Corporate Security

The Remote Red Room: The First Defense in Corporate Security

When organizations began sending employees home in early 2020, it’s likely that few realized just how long their workforces would remain remote or how security risks would increase right along with it.

All States Now Compliant Ahead of REAL ID Deadline

The Department of Homeland Security (DHS) is announcing that after more than 15 years since Congress passed the REAL ID Act, all 50 states are now in full compliance issuing these cards, with most states becoming compliant in the last four years.

DHS to Implement Strategic Framework for Countering Terrorism and Targeted Violence

In September 2019, the Department of Homeland Security (DHS) issued its Strategic Framework for Countering Terrorism and Targeted Violence (CTTV Framework) and now offers this corresponding Public Action Plan demonstrating the Department’s efforts to combat emerging threats and improve information sharing.

police standing in a group

Law Enforcement Data “Blue Leaker”: A Danger or a Public Service?

The recent release of a massive cache of sensitive Law Enforcement data has been in the news recently. The trove of roughly 270 gigabytes of data posted to the Denial of Secrets website has been referred to as “BlueLeaks."

Security Industry Association Says Portland Facial Recognition Bans Are Shortsighted

Security Industry Association Says Portland Facial Recognition Bans Are Shortsighted

City council’s decision to prohibit the technology’s use by businesses impacts companies’ ability to secure their facilities and property and protect their people and customers.

Genetec: ALPR Accuracy Rates Improve 5%

While the accuracy rate of traditional rules-based ALPR systems is very good, every false positive still requires human intervention.

Dahua Solutions Help Businesses Become Pandemic-Ready

Dahua Technology is helping businesses reopen. Thermal imaging, face detection and other technologies play key roles in screening for skin temperature and determining whether someone is wearing a mask.

Richmond TSA Officer Recalls His Role at the World Trade Center After 9/11 Terrorist Attacks

Richmond TSA Officer Recalls His Role at the World Trade Center After 9/11 Terrorist Attacks

As he reflected back to 2001, Mitchell said he thinks back to the men and women who he worked alongside at Ground Zero.



Federal Contracts on the Line for Outsourced Jobs

President Donald Trump said he plans to hold U.S. companies responsible for outsourcing products to be made in China by withholding federal contracts to those companies who depend upon Chinese manufacturing sources.

SIA issues policy on ethical use of facial recognition

SIA issues policy on ethical use of facial recognition

The Security Industry Association (SIA) has released its new policy principles guiding the development and deployment of facial recognition technology.

COVID Has Made Privacy a Concern, An App Survey Finds

COVID Has Made Privacy a Concern, An App Survey Finds

The pandemic has been a great equalizer in the fears it has unearthed. Regardless of country, socioeconomic status or age, we have all shared concerns for our own health and that of our loved ones.

Boon Edam to Participate in First Virtual GSX+ Event

Boon Edam Inc. has announced that they will be exhibiting in the first virtual Global Security Exchange Plus (GSX+) conference, Sept. 21-25.

With Police Stretched to the Limit, Private Security Agencies Can Help Keep Businesses Safe

The slowdown in international travel as a consequence of the COVID-19 pandemic has significantly impacted the travel security industry.

Trump Administration Launches First Cybersecurity Principles for Space Technologies

The Trump Administration announced the first comprehensive cybersecurity policy for systems used in outer space and near space Sept. 4.

Alcatraz and Channeltivity Partner to Deliver High Tech Channel Management Solutions for Dealer Success

Alcatraz and Channeltivity have united to help deliver a state-of-the-art channel and training program that fosters partner success.

Cyberattacks on state, local government up 50%

Many of the cyberattacks on state, local, tribal and territorial governments are not complicated and could be avoided through simple steps such as improved cyber hygiene and two-factor authentication, a new report states.

The Role of Confidential Computing in Protecting Cloud Applications and Sensitive Data from Breaches

Today, encrypting data is popular for protecting private information at rest and in transit, but protecting data in use in an efficient manner has proven difficult.

Security Professionals Overcome the Challenges of COVID-19 to Help Bring School Supplies to Children in Need with Mission 500’s “Virtual” Florida Backpack Event

In what has become an annual event spearheaded by Mission 500, students at Crosspointe Elementary School in Boynton Beach, Florida will once again have essential school supplies, provided by COPS Monitoring thanks to the generous efforts of the “Back to School Backpack Event.”

Democratizing Access

Democratizing Access

The COVID-19 pandemic has put financial institutions under more pressure to stay on top of fraudulent activity— as opportunists are looking for any weakness in a system that can be exploited.

The Rise and Sophistication of Mobile Apps in Physical Security Sector

Safety and security risks are everywhere including the office, schools, concerts, retail malls and hospitals. However, security professionals, who are tasked with protecting the public, can’t be everywhere at all times and they require timely information in order to prevent potential incidents.

Coordinating Emergency Communications

Coordinating Emergency Communications

One of the many lessons learned from the Smart Cities movement is that you can achieve significant improvement in community safety and resilience when you use network technologies to facilitate communications and data sharing.

Why Lone Workers are Vulnerable

The economic slowdown created by the pandemic has forced many retail chains, restaurants, hotels, banks and financial institutions with a retail presence to cut back on staff and change their business models.

The New Heart of Security

The physical security industry has before it an incredible opportunity: to lead business digital transformation (DX) through security convergence.

The Threat from Within

The Threat from Within

Just as banks use every tool at their disposal to maximize revenue opportunities and manage their ledger, they must take the same approach when it comes to security.

Controlling the Cogeneration Plant for Hudson Yards

Towering over the Hudson River on Manhattan’s New West Side is Hudson Yards – a cultural epicenter with more than 100 diverse shops, residences and culinary experiences. By area, it’s the largest private real estate development in the United States – covering more than 18 million square feet over seven city blocks.

Turning to technology as safe and trustworthy passwords

More Secure Banking

To be successful in financial services, banks, investment firms and other institutions need to prove to their customer base that they are safe and trustworthy. Yet many still rely on passwords, PINs and other knowledge- based authentication factors—which are not only unreliable, but also insecure.

A Hands-free Environment

No one will argue that the COVID-19 pandemic has dramatically changed the way we interact in public spaces.

Using AI Power

Using AI Power

Video surveillance is commonplace today, but many organizations don’t even realize that they aren’t fully leveraging the video data that their cameras capture. Traditionally, law enforcement and physical security teams use video cameras to monitor areas in real-time and to review footage to glean evidence for post-incident investigation.

The Evolution of Risk

Risk prevention has always been a fundamental part of business planning and operations. And while the various forms of protection available have evolved over the years, so also has risk. About 20 years ago, professional security was mostly limited to night watchmen, armored trucks and closed circuit video cameras wired to VCRs.

Encrypt Your Flash Drive

Encrypt Your Flash Drive

USB drives are convenient devices. They are used daily by hundreds of millions of people around the world to store or transport data, much of which would be considered confidential. Chances are there are plenty of USB drives floating around your company or organization right now.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3