Top Stories


The Internet of Things and the security challenges it creates for small business

The Internet of Things and the security challenges it creates for small business

Managing the traditional limitations of time and resources means that running a small business on a budget is a challenge, but these difficulties become more pronounced when resources are stretched even further by the increased security demands of new technology.

Telegram App Targeted in DDoS Cyberattack

Telegram App Targeted in DDoS Cyberattack

An DDoS attack aimed at slowing connectivity for the Telegram app took place this week. The cyberattack coincided with large protests in Hong Kong, and with most of the IP addresses coming from China, it is speculated that they were involved in the attack.

Kapersky Researchers Warn Google Calendar Users Against New Phishing Attacks

Kapersky Researchers Warn Google Calendar Users Against New Phishing Attacks

Kapersky security researchers have identified a new phishing attack that takes place in Google Calendar. Threat actors send a Google Calendar invitation to a user that contains a malicious link hosting a phishing URL.

Global Perimeter Security Market Expected to Experience Large Growth

Global Perimeter Security Market Expected to Experience Large Growth

According to research done by Grand View Research, the global perimeter security market is projected to reach USD 29.6 billion by 2025.

Study Findings Show Dark Net Poses Great Risk to Large Enterprises

Study Findings Show Dark Net Poses Great Risk to Large Enterprises

Bromium®, Inc. has announced the findings of ‘Behind the Dark Net Black Mirror,’ a study that showed the growing risk posed by the dark net to the enterprise.

More than One in Five Americans Have Cancelled or Considered Cancelling Plans to Attend Large-Scale Sporting Events and Concert Festivals Due to Concerns About Their Physical and Cyber Safety – New Unisys Security Index™

Security barometer shows 83% of Americans are concerned about a criminal attack causing physical harm at large-scale events, with half of respondents extremely or very concerned.

Are Your Linux Servers Really Protected?

Are Your Linux Servers Really Protected?

It’s often thought that because the servers are behind lock and key and/or in a data center, and because the data is in continuous use, encrypting the server drives isn’t needed since the data is never at-rest.

Eugene Airport to Receive Fourth Bomb Detection Machine

Eugene Airport to Receive Fourth Bomb Detection Machine

In lieu of eight straight years of passenger growth, the Eugene Airport will be gaining a fourth explosive detection system (EDS) to increase airport security and efficiency.



Data Breach Compromises Tens of Thousands of Travelers’ Images, License Plates

Data Breach Compromises Tens of Thousands of Travelers' Images, License Plates

A subcontractor of U.S. Customs & Border Protection transferred images of travelers and license plates to its network without CBP’s authorization or knowledge. He was subsequently hacked, and the information was compromised.

Stanford Scholars Set Forth 2020 Election Security Recommendations

A group of 14 Stanford scholars put together a report of recommendations for increased election security, addressing problems of cybersecurity, ballot security, and election transparency.

Morse Watchmans Promotes Tim Purpura to VP of Sales and Marketing

Seasoned Pro Instrumental in Bringing Company to Next Level

Police departments work to build city surveillance through home security

Police departments work to build city surveillance through home security

Police departments have figured out a new way to increase city security – through privately-owned surveillance cameras. While the smart home security camera market is expected to rise swiftly in the next few years, police may have to implement restrictions to develop resident support.

Heathrow Airport optimizes security check with new 3D scanners

Heathrow Airport Optimizes Security Check with New 3D Scanners

London’s Heathrow Airport is implementing new 3D scanners that eliminate the need for passengers to remove liquids from their bag as they go through security.

Hanwha is Dropping Huawei Hisilicon from All Their Products

Hanwha is Dropping Huawei Hisilicon from All Their Products

Huawei is subject to the U.S. NDAA government ban and has been 'red flagged' on the United States “entity” list. In addition to cybersecurity concerns, Huawei now faces supply chain barriers that could impact their ability to produce many products such as Hisilicon chips.

Community Appoints Todd Stevens as Regional Sales Manager

Todd Stevens will be joining the North America sales team at Community Professional Loudspeakers as the regional sales manager.

Feenics Adds New Field Personnel to Address Heightened Growth of Keep by Feenics™

Company adds two key U.S. positions to handle regional uptick and assist with sales and business development of the company’s VAR network.

Florida begins issuing new, more-secure drivers licenses

Florida Issues New, More-Secure Drivers License, Identification Cards

Florida officials use tactile security feature to increase security on drivers licenses and identification cards.

Exclusive Report Expects Rapid Growth for the Vehicle Access Control Market

Exclusive Report Expects Rapid Growth for the Vehicle Access Control Market

MarketsandMarkets says the worth of the vehicle access control market could reach $22.6 billion by 2027.

Chicago Authorities Install 20 Cameras Along So-Called ‘Heroin Highway’

Chicago Authorities Install 20 Cameras Along So-Called ‘Heroin Highway’

In an attempt to crack down on drug traffic on the Eisenhower Expressway, authorities installed 20 new high-surveillance cameras.

Entrust Datacard completes purchase of market-leading general-purpose hardware security business, nCipher Security, from Thales

More than 300 nCipher employees are now part of the Entrust Datacard team.

Data Analyst Shares Which States Rank Highest, Lowest in Burglary Arrests

Data Analyst Shares Which States Rank Highest and Lowest in Burglary Arrests

The 2017 FBI crime report shows that the worst state to be a burglar in is Delaware. The best? Nebraska.

Cisco Announces Plan to Acquire Sentryo

Cisco Announces Plan to Acquire Sentryo

Cisco recently announced that it plans to acquire Sentryo in order to optimize visibility, segmentation, and operations for Cisco customers.

SmartTrucks offer video surveillance to commercial, governmental, and educational facilities

SmartTrucks Offer Video Surveillance to Facilities

Video surveillance is no longer stagnant. With new SmartTruck technology, IoT gives officials real-time, archivable coverage of facilities.

LAX Thursday Morning Rescreening Causes Cancellations, Delays

LAX Thursday Morning Rescreening Causes Cancellations, Delays

After a power outage the previous evening, the Los Angeles International Airport cleared Terminal 1 Thursday morning for security concerns.

Primeview to Bring FusionMAX LED Developments to the Show Floor at InfoComm 2019

Global display solutions company will be unveiling its new video wall solutions at a private innovation suite by invitation only at booth #2688 at InfoComm 2019.

Apple enforces user data security with new updates

Apple Enforces User Data Security with New Updates

Apple has “you control your data" for a while now, but with these new updates, the data is almost completely the consumers’.

LabCorp Announces AMCA Breach May Have Affected Their Patients

LabCorp reported that about 7.7 million patients’ personal information may have been compromised in the AMCA data breach.

How Organizations Can Leverage Microsegmentation to Create a Zero Trust Environment

How Organizations Can Leverage Microsegmentation to Create a Zero Trust Environment

No matter how good an organization’s perimeter defenses and threat detection systems are, it really is just a matter of when it will get breached.

Cequence Security Expands Its Security Platform with CQ appFirewall

New security module leverages the platform’s CQAI analytics engine to bring much-needed innovation unavailable in legacy web application firewalls

Australia Reels from Worst Mass Shooting in Over 20 Years

Australia Reels from Worst Mass Shooting in Over 20 Years

At least four people were in killed in the first mass shooting Australia has seen since 1996.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3