Top Stories


Top 5 Cybersecurity Strategies Integrators Need to Learn

As cyberthreats to video surveillance systems continue to increase, there is high demand from end-users for the channel to be knowledgeable and prepared to mitigate cybersecurity risks. Ongoing education is critical for both security and IT employees, preparing them to work together as cybersecurity experts

Security and Safety Things Opens App Challenge for Developers

Winners of the challenge will be eligible for a cash prize of 10 000€ each and will have their solution showcased.

new york capitol

New York State Responded to Cyber Attack on Government Servers Weeks Before Coronavirus Pandemic Hit

Officials handled an attack that disabled access to state agency databases just a few weeks before the state became the epicenter of the COVID-19 crisis.

security guard

Demand for Security Guards, Cybersecurity Workers Remains High Amid Coronavirus Pandemic

Security companies are scrambling to hire guards and IT workers as businesses worry about break-ins to closed properties and cybersecurity issues associated with working remotely.

sony hq

Sony to Discontinue Branded Video Surveillance Presence

The company is also ending its partnership with Bosch, which began in 2016.

5G cell tower

New Government Strategy for 5G Security Sets Stage for Domestic Rollout

Franco Zaro of Valid breaks down new government efforts to establish a 5G security strategy and public paranoia about the wireless infrastructure.

wilson bank

Wilson Bank & Trust Upgrades to Hanwha Techwin Cameras and Recorders to Better Serve Customers

Forty bank locations have been outfitted with Hanwha cameras that can mitigate cybersecurity risks

new york camera

New Tool Uses Video Surveillance Feeds and Computer Algorithms to Track Social Distancing Behaviors

A MIchigan company is monitoring traffic in typically busy areas to show how locals are following stay-at-home orders during the coronavirus crisis.



tsa checkpoint

TSA Faces Record-Low Numbers of Travelers, Coronavirus Outbreak Among Employees

More than 370 employees have tested positive for COVID-19 as TSA security screeners experience nearly empty airports due to the pandemic.

baltimore downtown

Lawsuit Blocks Baltimore From Launching Surveillance Plane Program to Investigate Crimes

Activists and ACLU lawyers succeeded in stopping a six-month trial run of an aerial surveillance program funded by private philanthropists.

google coronavirus

Apple and Google Team Up For Coronavirus Tracing App, Sparking Privacy Concerns

The app will make it easier for individuals and public health officials to track the spread of COVID-19, but privacy rights groups are pushing for transparency.

Allied Universal Seeks to Increase Workforce by 30,000 Over Next Two Months

Security services provider continues to fill essential roles during COVID-19 pandemic

security shield

How to Enhance Public Safety With Emerging Technologies

Security leaders are investing in advanced technologies like artificial intelligence, biometric solutions and advanced communication networks.

Forming Real Bonds

Forming Real Bonds

Artificial intelligence has been in the headlines a lot recently. It will help save mankind or usher in the robot apocalypse, depending on which article you read.

Improving Security

Vandalism, graffiti and theft are always major concerns for project managers at a job site, and security guards sometimes are not enough to deter that.

fbi front

FBI Warns Financial Institutions To Beware of Coronavirus-Related Scams

Business email compromise attacks continue to be effective, tricking victims into transferring funds to fraudulent accounts.

Avoiding Danger with Secure Data Storage

Avoiding Danger with Secure Data Storage

While CCPA is meant to enhance privacy rights and consumer protection for the residents of California, as with many laws enacted in the state, it will impact most businesses across the country and the rest of the world.

Guard services and managing the logistics of event security

A Multi-Faceted Role

On so many levels, the events of September 11, 2001 drastically altered the event security landscape.

On-site Lockers

Stadium bag policies continue to be a growing priority at sports stadiums and arenas across the U.S., particularly in regard to personal bag size and the particular items that are permitted into facilities during scheduled events.

Improving Operations

Working with several systems integrators, Kirkland's chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient's enterprise Video Management Software (VMS).

isc west 2019

ISC West Moves 2020 Conference to October Due to Coronavirus Threat

Due to the stay-at-home orders in place and the shifting landscape of the COVID-19 pandemic, ISC West organizers have rescheduled the security conference and expo for the second time.

Using the Cloud for Identity Protection

Using the Cloud for Identity Protection

The way ID cards are used in the enterprise and on college and university campuses has changed dramatically in recent years.

Making Cities Smarter

According to several predictions, urban areas will see a population increase of 2.5 billion people by 2050. When combined with the rise of smart and connected cities, this growth in urban population is posing a new set of complex security and safety challenges.

heathrow airport

Airport CEO Believes Health Tests for Passengers Will Become More Common

Airlines may require passengers to take temperature tests or other measurements of health before they can board, according to the CEO of London's Heathrow Airport.

Quantum Reorganizes Engineering Division with General Managers Leading Primary and Secondary Storage Businesses

The positions will enable Quantum to expand its leadership in storing video and other unstructured data

Enhancing the Perimeter

Enhancing the Perimeter

Driven by high-profile intrusion incidents, perimeter security has become a top priority for airports in recent years.

COPS veteran donation

COPS Monitoring Donates Laptops to Help Reunite Quarantined Veterans With Their Families and Loved Ones

Alarm services provider made the donation to the Veterans Memorial Home in Vineland, N.j.

A Virus on the Move

If you had second thoughts about traveling to ISC West this year because of the coronavirus, raise your hand.

david zolet

CentralSquare Names 30-Year Gov Tech Veteran David Zolet as Chief Executive Officer

Zolet brings decades of proven expertise to lead one of the largest public safety and public administration software companies

security operations center

Establishing IT Infrastructure Through Security Operations Centers

How to improve client and employee trust, collaborate across departments and reduce costs through SOCs

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3