Top Stories


work wifi

10 Simple Steps to Take Right Now to Secure Your Business WiFi Network

Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network

man on computer

Combating Third-Party Excuses to Your Information Security Requests

How to rebut the common (and illegitimate) excuses used by third-parties for not complying with your information security due diligence requests

music festival crowd

After Gilroy Garlic Festival Shooting, Chicago Ramps Up Security Measures at Lollapalooza 2019

Public safety is a key concern for the music festival, which draws hundreds of thousands to Chicago’s Grant Park each year.

At Cyber:Secured Forum, Cyber and Physical Security Professionals Tackle Integration Challenges

One topic seemed to dominate this year’s conference: the ongoing challenges of integrating physical security technologies with cybersecurity products.

united airlines

United Airlines to Expand Biometric Screenings Through CLEAR Partnership

The partnership between the airline and the security company will also offer discounted and free CLEAR memberships to United rewards members.

Relying on Power

Relying on Power

Mohegan Sun is a premier gaming and resort destination covering 185 acres of reservation land along the banks of the Thames River in the foothills of southeastern Connecticut. First opened on Oct. 12, 1996, Mohegan Sun can truly be classified as a mega- resort.

A Winning Security Plan

A Winning Security Plan

In the world of sports, oftentimes there’s as much action in the stands as there is on the floor. That’s why the Milwaukee Bucks felt it was so important to design their new stadium with a network of security cameras to safeguard the welfare of players and fans alike.

Moving to the Door

Moving to the Door

Biometrics have rapidly expanded into our daily lives, as millions of people use fingerprints to unlock their mobile phones, access cash through ATMs, and verify their identity in a growing range of use cases.



Gaining Customer Trust

Gaining Customer Trust

Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.

Protecting His House

Protecting His House

Criminals often view houses of worship as soft targets. The mission of these groups needn’t change but for the safety of clergy and congregants, leaders must commit to hardening their facilities against those that would do them harm.

Safe in Sound

While video surveillance often takes center stage in security deployments, equally as important is audio.

Using Mass Notification

Event venues and sporting complexes pose unique security and communication challenges. Numerous factors, including crowd size, whether the event is indoors or outdoors and what time of day the event is taking place all impact how a safety plan is developed.

A Word of Caution

A special word of caution needs to be emphasized when changing over to mobile systems. Many legacy access control systems require the use of backend portal accounts.

Changing the SIEM Game

For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.

Shielding the Attendees

Shielding the Attendees

By their very nature, terrorist attacks and errant drivers, who can also create untold damage, are unpredictable and predicated on surprise.

Ready Set Tackle

Being a TSA agent at Phoenix Sky Harbor International Airport doesn’t mean you have to understand the game of football or does it?

Advanced VMS and Analytics

The shipping industry is being tasked to improve productivity, increase speed of operations and mitigate risk from new and potentially devastating forms of attack from both external and internal potential threats.

Doyle Security Products provides Midwestern presence for ABLOY USA’s Distributor Network

The Minnesota locksmith wholesale company is the latest to join the ABLOY USA distributor network.

Thermal Imagers Deployed

Thermal Imagers Deployed

Dominion Nickel Alloys Ltd. operates on a global scale. Dominion specializes in the purchasing, sorting, processing, and marketing of a broad range of high temperature and specialty nickel-based alloys.

Plan Might Have a Weakness

Plan Might Have a Weakness

Cybersecurity and physical security no longer exist in two different worlds. Each now supports and depends on the other as part of a comprehensive risk and liability management program.

Encrypted USB Drives

The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.

Don’t Reinvent the Wheel

Don’t Reinvent the Wheel

As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a heavy reliance on the network.

capital one card

Capital One Breach Jeopardizes Data of Over 100 Million People

A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.

small plane flying

Department of Homeland Security Issues Cybersecurity Warning for Small Planes

Planes using networked communication systems are particularly vulnerable to cyberattacks, according to a flaw discovered by researchers.

siri app

Apple Contractors Regularly Overhear ‘Confidential’ Conversations Through Siri, Whistleblower Says

An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.

At Least Four People Killed in Shootings at Festivals in California and New York

At Least Four People Killed in Shootings at Festivals in California and New York

The Gilroy, California police chief credited his department’s robust security operation with stopping the shooter in his tracks.

voter line

Senate Committee Releases Bipartisan Report on Election Security Threats

The report comes as Senate Republicans move to block election security legislation, arguing that election officials have already fixed the security issues they experienced in 2016.

skateboarder on street

Security Guard Suffers Permanent Brain Damage After Fight With Skater

Skateboarders are re-examining a culture of conflict with security guards in the wake of a tragic incident between a professional skater and a guard in San Francisco.

Using Zero Trust and Conditional Access Policies to Reshape Cybersecurity

Using Zero Trust and Conditional Access Policies to Reshape Cybersecurity

Eliminate trust based on location, such as within a company network, and always verify users at every access request.

public housing new york

Lawmakers Seek to Ban Biometric Recognition Technology in Public Housing

The legislation, which would ban facial recognition entry systems, would be the first to address what technology landlords can impose on residents.

Featured

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3