Top Stories


Pentagon aerial shot

Following Court Decision, Amazon and Microsoft Set to Compete Over Military’s Cloud Computing Contract

The $10 billion JEDI project has been rife with controversy, but the Pentagon still hopes to seal the deal with one of the companies next month.

Federal Election Commission

Cybersecurity Company Can Offer Discounted Services to Campaigns, FEC Rules

A California-based company has been given the OK to offer its services to campaigns for a discounted rate ⁠— as long as that rate is the same for other clients.

tsa security airport line

TSA Screened Record Number of Travelers During July Fourth Weekend

The agency said it screened over 11.9 million passengers and crew as well as over 8 million checked bags during the holiday travel period.

Committee on small business sign

Senators Introduce Bill to Help Small Businesses Improve Cybersecurity Protections

The legislation would require the Department of Homeland Security to develop educational resources for business owners and train counselors on higher-level cybersecurity information.

detroit police car

Opposition to Government Use of Facial Recognition Technology Grows in Detroit

A recent public meeting exposed tensions about how a city-wide video surveillance system is being used to identify crime suspects in Detroit.

Employees Still Struggle to Identify Phishing Threats and Properly Protect Their Data, Report Finds

Respondents, who answered 22 percent of questions incorrectly, struggled most with assessments about mobile device encryption and protections for personally identifiable information.

British Airways plane

British Airways Hit With Record $229 Million Fine After 2018 Hack

The airline, along with Mariott International, is facing harsher penalties for not properly protecting customers’ personal data prior to cyberattacks.

Zoom headquarters

Flaw in Video Conferencing App Could Have Given Hackers Immediate Access to Webcam Feeds

The company, Zoom, is now taking action to update its software after a security researcher discovered several serious security vulnerabilities in the popular video chat app.



power towers

Senate Passes Bill To Explore ‘Analog’ Solutions to Securing America’s Energy Grid

If the Securing Energy Infrastructure Act is signed into law, it will create a working group tasked with isolating the energy grid from attacks using “manual procedures.”

drivers license

Report: ICE Used Facial Recognition Technology To Search Multiple State Driver's License Databases

In states where undocumented immigrants can obtain driver’s licenses, ICE has asked agencies to search for matches in their databases. Two have complied.

Chinese Soldier

China Installs Secret App to Travelers’ Phones to Monitor For ‘Objectionable Material’

The application is the Chinese government’s latest escalation of its surveillance operation of Uighurs, a Muslim minority, for supposed terrorist activity.

Amazon building

Amazon Patent Shows Potential for Drones To Be Next Frontier in Home Security

The tech behemoth already plans to roll out delivery drones. It’s now considering offering a home surveillance service to customers.

Two people using computer in office space

Five Ways to Keep Your Workplace Safe Online

Regardless of size or business type, companies must institute these basic practices to make sure their organizations are well protected from cybercriminals.

senate committtee

Senate Report: Federal Agencies Have Failed To Respond to Growing Cybersecurity Threats

Eight agencies, including the Department of Homeland Security and Education Department, are using outdated systems that have few security updates and have failed to protect Americans’ personal data.

smart home lock

Major Security Vulnerabilities in Smart Home Devices Could Allow Hackers to Unlock Doors

A now-discontinued smart home hub had flaws that allowed researchers to hack into the device without even knowing the plain-text password put in place by the owner.

Map of Delaware

Ten Percent of Delaware Population Affected by Nearly Nine-Year Security Breach at Insurance Provider

Dominion National discovered in April that its servers, containing the financial and personal data of 95,000 Delawareans, may have been accessed by an unauthorized party since 2010.

georgia county courthouse

Georgia Court System Goes Offline After Ransomware Attack

The attack, which was discovered Monday, comes shortly after two Florida cities agreed to pay ransoms in order to recover their computer systems from hackers.

estonia data center

Estonia Creates World’s First-Ever ‘Data Embassy’ to Improve Information Security

The high-tech country’s decision to move highly sensitive databases to another country could be a model for other nations hoping to maintain their data security.

Workplace Violence Is Leading Companies To Adopt Stricter Security Measures

Workplace Violence Is Leading Companies To Adopt Stricter Security Measures

Employers are becoming more vigilant about workplace security, implementing intensive screenings for job candidates and electronic badge systems for employees.

Travelers with malicious intent could abuse global entry system

Travelers With 'Malicious Intent' Could Abuse Global Entry System, Report Finds

A system that allows international travelers to skip lines when entering the U.S. is ‘vulnerable to exploitation,’ according to a new report from the Department of Homeland Security.

mission 500 softball fundraiser

Save the Date for Mission 500's Annual Softball Game

Mission 500 has announced that its fifth annual security industry softball game fundraiser will take place on Sunday, September 15.

southwest microwave

Southwest Microwave Announces New Manufacturer's Representative for Northwest U.S., Alaska and Hawaii

This addition to the Southwest Microwave resource team will provide clients with security experts that are accustomed to the unique physical environment and perimeter protection needs of the region.

IDIS America Partners With The Salvation Army of North Texas For Enhanced Safety and Security

IDIS’s donation, in conjunction with KOTRA Dallas, will help to ensure security and peace of mind for staff, volunteers, and visitors.

House of Representatives Passes Election Security Bill

House of Representatives Passes Election Security Bill

The House of Representatives passed an election security bill 225-184 on Thursday of last week. The Securing America’s Federal Elections (SAFE) Act is designed to prohibit cyberinterference.

Google, University of Chicago Medical Center Accused of Sharing Patients’ Data

Google University of Chicago Medical Center Accused of Sharing Patients Data

Google and the University of Chicago Medical Center are being sued for allegedly sharing unauthorized data from their patients.

Insecurely Secure: A False Sense of Security

Insecurely Secure: A False Sense of Security

Security is an interesting subject that follows us from before our birth until the day we die. Our entire life is comprised of security, insecurity, and a false sense of security that often confuses the two.

IDIS Dynamic Privacy Masking Delivers Enhanced Anonymization and Privacy Tools

Provided free of charge, IDIS privacy software enhances the ability of end-users to obscure protected or non-relevant parties in a quick and efficient manner when utilizing or turning over surveillance footage

New High-Tech Riverbank Surveillance Cameras Go Beyond Capturing Footage

New High Tech Riverbank Surviellance Cameras Go Beyond Capturing Footage

Remote Surveillance Units have been installed in Riverbank, Calif., and they have the power to do much more than just capture footage. These high-tech surveillance cameras can detect when a crime is being committed, and even allow police officers to communicate with the offender.

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Researchers have found over 2,000 apps that are potentially counterfeits, modeled after popular app downloads. These counterfeits contain harmful malware that could harm unsuspecting users.

ONVIF Hosts 20th Developers’ Plugfest

ONVIF Hosts 20th Developers’ Plugfest

Developers and engineers from 22 ONVIF member companies gathered at the three-day event to test their implementations of ONVIF Profiles with other ONVIF Profile-conformant products.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3