Top Stories


Steve Van Till to Receive the Security Industry Association's 2019 Lippert Award

The Security Industry Association selected Steve Van Till as the 2019 recipient of the George R. Lippert Memorial Award.

FBI Warns Businesses and Organizations of Rising “High-Impact” Ransomware Threat

FBI Warns Businesses and Organizations of Rising “High-Impact” Ransomware Threat

Even if an organization decides to pay a ransom against the FBI’s advice, they should report the crime to law enforcement, according to the FBI alert.

Ransomware Attack Causes Alabama Hospital System to Turn Patients Away

Ransomware Attack Causes Alabama Hospital System to Turn Patients Away

In the latest ransomware attack scourge, three hospitals in Alabama were able to continue serving existing patients but said they could not take new cases.

France Plans to Become First European Country to Use Facial Recognition for Digital Identity System

France Plans to Become First European Country to Use Facial Recognition for Digital Identity System

The French government plans to introduce a program called Alicem that will require residents to take a selfie video to compare to their passport photo.

“Joker” Premiere Presents Security Concerns For Theater Chains, Local Police

“Joker” Premiere Presents Security Concerns For Theater Chains, Local Police

Moviegoers and the families of victims of the Aurora theater shooting worry that someone could stage a copycat attack during opening weekend.

FDA Warns Medical Device Manufacturers of “Urgent” Cybersecurity Flaws

FDA Warns Medical Device Manufacturers of “Urgent” Cybersecurity Flaws

Security researchers found 11 significant vulnerabilities in devices that use the IPnet software, though there are no confirmed incidents involving takeovers of the devices.

One Year Before Real ID Deadline, Americans Are Not Prepared For Airport Security Change

One Year Before Real ID Deadline, Americans Are Not Prepared For Airport Security Change

A majority of Americans did not know about the changing ID requirements for boarding planes in a recent survey, and DHS said that only 27 percent of residents have been issued a Real ID.

Government Renews Efforts to Find and Fix Cyber Vulnerabilities in Aviation Systems

Government Renews Efforts to Find and Fix Cyber Vulnerabilities in Aviation Systems

The Department of Homeland Security is refocusing its efforts on cyber threats to aircraft, and the Air Force is sponsoring “hacking villages” to discover hacking vulnerabilities.



Camden Promotes David Price to Vice President Communications and Corporate Development

Price will continue to manage all internal and external corporate communications.

Stop at the Point of Contact

Stop at the Point of Contact

The vast majority of discussions involving security and parking areas focus on protecting people and property from vandalism, theft or violent crimes.

Analytics Driven Solutions

Analytics-Driven Solutions

As city streets and sidewalks become progressively more congested, city planners are facing new safety challenges, including distracted pedestrians, a growing numbers of bicyclists on the road and an increase in public transportation.

Data Privacy Requires a Security Response

Recent hacks into databases of some of the world’s biggest corporations and government organizations put the personal information of billions of people at risk.

Ameristar Perimeter Security announces SAFETY Act Certification for all Barriers and Bollards

The company now offers 11 SAFETY Act Certified products including the Impasse II high security fence and Stalwart anti-ram passive cable barrier systems that received certification in 2015.

Changing the Look of Security

Changing the Look of Security

Video analytics have been around almost as long as CCTV itself, rescuing security operators from the nearly impossible task of continuously and effectively monitoring video surveillance feeds.

A Global Solution

OSDP, or Open Supervised Device Protocol, is an access control communications standard designed to improve interoperability among access control and security products, and it’s becoming the new standard for access control technology.

Why Are SMBs so Worried?

Why Are SMBs so Worried?

Cloud storage is most used by small-and-medium businesses (SMBs). The reason is that it comes with many benefits for organizations in terms of flexibility and more importantly productivity.

Wyoming Surveys K-12 Principals

Wyoming State Superintendent Jillian Balow is making an effort to better understand how the state’s 48 school districts’ are protecting their students.

Upgrade Access Status

Upgrade Access Status

Valdosta Regional Airport in Valdosta, Georgia offers three daily commercial flights to and from Atlanta Hartsfield-Jackson International Airport, along with general aviation.

The Mighty PoE

In today’s IP-centric world, media converters work on lots of different types of media. The three that this article discusses are fiber optic media converters, extended distance media converters, and wireless media converters, all of which are transmitting an Ethernet signal

camera with facial recognition software

Security Industry, Police Groups Urge Congress Not to Ban Facial Recognition Technology

A coalition sent a letter to Congress asking members to consider alternatives to banning facial recognition, including the development of best practices and additional training.

Delta Scientific MP5000 Portable Barrier Certified to ASTM M50/P3

​Delta Scientific announced that traffic access control professionals can now set up MP5000 portable barriers on concrete, asphalt, compacted soils or vegetation in 15 minutes or less to provide certified M50 stopping power.

Theft on Wheels

Theft on Wheels

Oddly enough, in a world where virtually any item is only a mouse click and 24-hour delivery window away, we tend not to think much about how our merchandise gets from some warehouse to our front door. Unfortunately, there are thieves who do.

Smart City Technologies

Smart City Technologies

Two of the biggest trends today, particularly in the security surveillance and IoT realms, are border security and the emergence of local governments transforming their communities into smart cities.

Ushering in a New Era

Ushering in a New Era

Privacy issues continue to dominate headlines as the world’s biggest companies are being challenged on the ways they collect and use people’s data. Consumers are growing more concerned about how their activities are being tracked across the web as companies sell information to advertisers for a profit.

The Technology Role

While the political discussions that focus on how to secure America’s borders rage on without a clear resolution regarding what or how policies and procedures could change, one element of the discussion remains clear and present–that technology must and will play an ever more significant role at the U.S. border.

Technology at Risk

The San Francisco Board of Supervisors’ vote to ban the use of facial recognition technology puts the city at risk of not only falling behind on technological innovation, but returning to what one expert described as archaic processes.

Quality Control is Everything

Quality Control is Everything

In today’s world, there are a myriad of different manufacturers that produce similar products and there are so many options available to customers.

Are Contractors Ready for DOD’s Cybersecurity Framework?

Are Contractors Ready for DOD’s Cybersecurity Framework?

Contractors will face big changes and tight timelines next year when the Defense Department institutes its new Cyber Maturity Model Certification framework

Expanding Cybersecurity Solutions

Expanding Cybersecurity Solutions

Under GDPR, companies can be fined for not having their records in order, not notifying the supervising authority and those affected by a breach, or not conducting an impact assessment.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3