Top Stories


Connect ONE Announces Integration with HALO loT Smart Sensor from IPVideo Corp.

Now, end users can incorporate all their security services, including HALO, into the Connect ONE cloud-hosted user interface.

Vector Security Networks Announces 2020 Loss Prevention Foundation (LPF) Scholarship Recipients

$21,335 awarded to support loss prevention continuing education

Boon Edam Inc. Appoints New Factory Executive

Patrick Nora to steer Boon Edam America’s Manufacturing Company in fabricating security entrances and revolving doors.

Are You Securing All Your Remote Workers?

According to a 2019 State of Remote Work study, 62% of people work from home at least part of the time, with 82% of those individuals planning to either maintain or increase their level of remote work – validating that the physical location of users matters less and less in how organizations conduct business.

Three Ways SaaS Backup Solutions Can Minimize Damage from a Ransomware Attack

Today, any company without a plan to quickly and fully recover from a ransomware attack is whistling past the graveyard. In February, the New York Times reported that ransomware attacks in 2019 increased “41 percent” from the year before, with the average payment to release files increasing to “$84,116 in the last quarter of 2019, more than double what it was the previous quarter.” Meanwhile, the COVID-19 pandemic appears to be making the threat of ransomware worse.

online training graphic

Making the Best of a Challenging Situation: Engaging Employees Through Training

By helping employees to feel productive and sharpen skills through training, ADT Commercial has hit upon an innovative way to ease collective stress during uncertain times.



SecurityTrax Unveils Customizable CRM Platform

Major Platform Upgrade Includes All-New User Experience, Data Resources, and Powerful Integrations and Customizations

DHS Funding Will Target Violence and Terrorism Prevention

The department has seen an uptick in online efforts to recruit terrorists and encourage radicalization, leading to the development of the grant program.

Arcules and RAS Watch Partner to Optimize Global Security Operations Center Management

Arcules announces a strategic partnership with RAS Watch to deliver a fully managed and outsourced (GSOC) solution

nintendo game

Hackers Target Nintendo, Affecting Accounts of 160,000 Users

After customers reported fraudulent purchases, Nintendo announced that a credential stuffing campaign led to breaches of thousands of accounts.

CBP Sign

Employee Safety Stressed by CBP New Orleans

The agency has taken a vigorous approach to protect border patrol and customs officers from the COVID-19 pandemic.

who flag

World Health Organization Sees Dramatic Uptick in Cyber Attacks

Nearly 450 active email addresses and passwords used by WHO staff have been leaked online, and the public has received email scams from people posing as staff.

thermal camera

“COVID-19” Thermal Cameras Start to Hit the Marketplace

As video surveillance companies look to recover lost revenue, temperature detection capabilities have become a hot commodity.

devops globe

Top Eight Methods to Secure DevOps Pipelines

In order to address vulnerabilities and risks, security teams must enable privileged access management and automate security tools, among other tips.

Glitch May Have Exposed Data of Thousands of Small Businesses Applying for Federal Relief Loans

Nearly 8,000 applicants to a Small Business Administration loan program may have had their data shown to other users filling out the application.

LenelS2 OnGuard System Approved for Federal Government Use

Embedded validation software available from HID Global

Capitol Hill at sunset

Industry Groups Push For More Cybersecurity Funding In Future COVID-19 Stimulus Legislation

With high numbers of ransomware attacks and increased threats due to teleworking, advocacy groups want Congress to prioritize cybersecurity funds to local and state governments.

COVID-19 Phishing Attacks are Exposing Email Security’s Biggest Flaws

To those of us who work in cybersecurity, hackers and nation state adversaries exploiting the pandemic to drive fear and misunderstanding is certainly horrific, but not at all unexpected. To put the situation into perspective, Tech Republic reported on a 667% increase in malicious email attacks in just a 22-day span (March 1-23). According to the article, more than 2% of those 467,000 spear-phishing emails detected were COVID-19 related.

Top 5 Cybersecurity Strategies Integrators Need to Learn

As cyberthreats to video surveillance systems continue to increase, there is high demand from end-users for the channel to be knowledgeable and prepared to mitigate cybersecurity risks. Ongoing education is critical for both security and IT employees, preparing them to work together as cybersecurity experts

Security and Safety Things Opens App Challenge for Developers

Winners of the challenge will be eligible for a cash prize of 10 000€ each and will have their solution showcased.

new york capitol

New York State Responded to Cyber Attack on Government Servers Weeks Before Coronavirus Pandemic Hit

Officials handled an attack that disabled access to state agency databases just a few weeks before the state became the epicenter of the COVID-19 crisis.

security guard

Demand for Security Guards, Cybersecurity Workers Remains High Amid Coronavirus Pandemic

Security companies are scrambling to hire guards and IT workers as businesses worry about break-ins to closed properties and cybersecurity issues associated with working remotely.

sony hq

Sony to Discontinue Branded Video Surveillance Presence

The company is also ending its partnership with Bosch, which began in 2016.

5G cell tower

New Government Strategy for 5G Security Sets Stage for Domestic Rollout

Franco Zaro of Valid breaks down new government efforts to establish a 5G security strategy and public paranoia about the wireless infrastructure.

wilson bank

Wilson Bank & Trust Upgrades to Hanwha Techwin Cameras and Recorders to Better Serve Customers

Forty bank locations have been outfitted with Hanwha cameras that can mitigate cybersecurity risks

new york camera

New Tool Uses Video Surveillance Feeds and Computer Algorithms to Track Social Distancing Behaviors

A MIchigan company is monitoring traffic in typically busy areas to show how locals are following stay-at-home orders during the coronavirus crisis.

tsa checkpoint

TSA Faces Record-Low Numbers of Travelers, Coronavirus Outbreak Among Employees

More than 370 employees have tested positive for COVID-19 as TSA security screeners experience nearly empty airports due to the pandemic.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3