Top Stories


SALTO Systems Names Matt Hanert as Regional Sales Manager for the Great Lakes Region

Sales manager oversees growth in Michigan, Illinois, Ohio and more

Cybersecurity Defense Strategies for Video Management Systems

Network design considerations for video management are essential to ensuring system performance, data integrity, and threat mitigation. The challenge is that system integrators are confronted with a multitude of existing situations which often do not meet industry or manufacturer best-practice standards in today’s dynamic cybersecurity-centric world.

2020 logo

A New Decade Means A New Frontier in Technology and Security

Can we imagine a new decade in which we protect our privacy and security while still maintaining innovation and freedom online?

facial recognition system

Majority of Facial Recognition Systems Are Less Accurate For People of Color, Federal Study Finds

Native Americans had the highest rates of false positives, while African-American women were most likely to be misidentified in a law enforcement database.

porch package

Study: One in Four Americans Have Had Package Stolen By “Porch Pirates”

Nearly half of Americans don’t believe that delivery companies are doing enough to prevent theft, but the survey respondents also aren’t willing to change their online shopping habits.

The Will-Burt Company Appoints Richard Lewin Chief Executive Officer

Lewin will take over as CEO of the 102-year-old company on Jan. 1

ring doorbell camera

Ring Faces Intense Scrutiny After Reports That Thousands of Users’ Information Was Leaked Online

The security camera company owned by Amazon says that there was not a breach of its servers and blame the issue on lax cybersecurity practices by users.

Housing and Urban Development

Lawmakers Seek Answers on HUD's Use of Facial Recognition

Eight Democrats in the House and Senate want to know if public housing residents are included in decisions about facial recognition use.



child smart watch

Millions of Children-Tracking Smartwatches Are At Risk Of Being Hacked

New findings by security firm Pen Test Partners reveal that 47 million devices worldwide could be exposed and tracked thanks to a strikingly insecure cloud platform.

washington metro

TSA, Washington Metro Test Out New System That Can Detect Explosive Devices on Passengers

The non-invasive system has been implemented by more transportation authorities around the world to address threats of terrorism in public spaces.

dark twitter screen

Hackers Targeted Epilepsy Foundation With Strobe Lights Aiming to Induce Seizures

The foundation has reported at least 30 incidents that targeted their Twitter account and followers last month with GIFs and videos of harmful strobe lights.

christmas shopping

Don’t Let ‘Christmas Phishing’ Ruin Your Holiday Season

As shoppers try to find deals in time to put presents under the tree, phishing campaigns are making it more difficult for consumers to tell if a website is naughty or nice.

san diego police

Due To New Law, San Diego’s Law Enforcement Facial Recognition Program Will End in 2020

Thanks to a statewide policy banning law enforcement use of facial recognition for three years, several agencies in San Diego will lose access to a database of facial scans.

orbitz site

Orbitz and Expedia Reach $110,000 Settlement with Pennsylvania AG Over 2017 Data Breach

The travel companies were fined for lax data security practices that potentially led to a breach affecting 880,000 payment cards globally.

camera with facial recognition software

Second Massachusetts Town Bans Government Use of Facial Recognition

The vote marks the fourth town that has banned facial recognition this year, following Somerville, Mass. and San Francisco and Oakland in California.

New Orleans Becomes Latest City To Suffer Ransomware Attack

The cyberattack caused the city to completely shut down its network for several days, but did not affect emergency services.

CBP Sign

ICE, Customs and Border Protection Face Lawsuit Over ‘Stingray’ Cell Phone Surveillance Tech

There is little known about the government’s use of “stingrays,” which tracks the locations of a cell phone and all devices within its range.

seattle tacoma airport

Seattle-Tacoma Airport Becomes First To Resist Government Push For Facial Recognition Expansion

The Port of Seattle Commission approved a moratorium on new biometric technology programs on Tuesday amid concern over data privacy and the tool’s accuracy.

Lindsey Graham

Senators to Big Tech Companies: Build A Back Door For Law Enforcement To Access Encrypted Messages, Or Else

The ongoing debate over Apple and Facebook’s decision to not build “backdoors” for law enforcement to obtain encrypted messages continued to rage during a Senate hearing on Tuesday.

ring doorbell camera

Hackers Have Developed Software To Break Into Ring Security Camera Accounts, And It’s Working

A Mississippi family had their Ring account hacked, allowing a man to speak to their eight-year-old daughter through the speaker.

Ojo Technology Names New Vice President of Services

Chris Krajewski previously served as general manager for Ojo's Central Valley office

cyber attack

Pensacola Government Faces Cyber Attack Hours After Shooting at Naval Base

The government has not linked the attack to the shooting, which is being investigated as an act of terrorism.

NJ state police

Gun Battle in New Jersey Ends With Six Deaths, Including Police Officer

The shooting in Jersey City lasted for over an hour and ended with a firefight between the suspects and several police officers.

Hospital Front

Family of Chicago Hospital Shooting Victim Files Suit Against Security Company, Hospital

The lawsuit argues that Mercy Hospital and SDI Security did not follow their own protocols by failing to issue alerts or initiating a lockdown of the building.

Huawei Files Second Lawsuit Against U.S. Government Over Ban

After the FCC voted to ban telecommunications companies from using subsidies to buy equipment from Huawei, the Chinese company filed suit.

When Compliance isn’t Good Enough: Thinking Beyond Regulations is a Must

With the January 2020 deadline for CCPA compliance looming, what lessons from GDPR compliance apply most this time around? Topping the list should be thinking and acting beyond compliance to build and sustain a long-range view of data security.

fbi logo

Shooting At Pensacola Naval Base is Being Investigated as Terrorism, FBI Says

Friends of the gunman, who was in the Saudi air force, have been cooperating with the investigation into the attack, which killed three sailors.

5G Inherits Some 4G Vulnerabilities

Commercial 5G mobile networks are only just becoming available, with highly developed use cases for improving autonomous automobiles navigation and smart-sensor networks, and new vulnerabilities and security requirements are already emerging.

Why IoT Security Needs A Totally Different Approach: Lock the Doors

We all heard it growing up, “Close and lock the doors when you leave the house!” We all knew where the doors were and how to lock them. It was easy. But what if you don’t know where all the “doors are” and they don’t all have “locks?” What’s the move then?

Hikvision camera

Study: One Billion Surveillance Cameras Expected to Be Installed Globally By 2021

China is home to more than 54 percent of those cameras, and the most growth is expected in developing countries like India and Brazil.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3