Top Stories


Shielding the Attendees

Shielding the Attendees

By their very nature, terrorist attacks and errant drivers, who can also create untold damage, are unpredictable and predicated on surprise.

A Winning Security Plan

A Winning Security Plan

In the world of sports, oftentimes there’s as much action in the stands as there is on the floor. That’s why the Milwaukee Bucks felt it was so important to design their new stadium with a network of security cameras to safeguard the welfare of players and fans alike.

Moving to the Door

Moving to the Door

Biometrics have rapidly expanded into our daily lives, as millions of people use fingerprints to unlock their mobile phones, access cash through ATMs, and verify their identity in a growing range of use cases.

INDUSTRY FOCUS

Ready Set Tackle

Being a TSA agent at Phoenix Sky Harbor International Airport doesn’t mean you have to understand the game of football or does it?

Changing the SIEM Game

For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.

Gaining Customer Trust

Gaining Customer Trust

Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.

Relying on Power

Relying on Power

Mohegan Sun is a premier gaming and resort destination covering 185 acres of reservation land along the banks of the Thames River in the foothills of southeastern Connecticut. First opened on Oct. 12, 1996, Mohegan Sun can truly be classified as a mega- resort.

Advanced VMS and Analytics

The shipping industry is being tasked to improve productivity, increase speed of operations and mitigate risk from new and potentially devastating forms of attack from both external and internal potential threats.



Doyle Security Products provides Midwestern presence for ABLOY USA’s Distributor Network

The Minnesota locksmith wholesale company is the latest to join the ABLOY USA distributor network.

Protecting His House

Protecting His House

Criminals often view houses of worship as soft targets. The mission of these groups needn’t change but for the safety of clergy and congregants, leaders must commit to hardening their facilities against those that would do them harm.

Thermal Imagers Deployed

Thermal Imagers Deployed

Dominion Nickel Alloys Ltd. operates on a global scale. Dominion specializes in the purchasing, sorting, processing, and marketing of a broad range of high temperature and specialty nickel-based alloys.

Safe in Sound

While video surveillance often takes center stage in security deployments, equally as important is audio.

Using Mass Notification

Event venues and sporting complexes pose unique security and communication challenges. Numerous factors, including crowd size, whether the event is indoors or outdoors and what time of day the event is taking place all impact how a safety plan is developed.

Encrypted USB Drives

The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.

Plan Might Have a Weakness

Plan Might Have a Weakness

Cybersecurity and physical security no longer exist in two different worlds. Each now supports and depends on the other as part of a comprehensive risk and liability management program.

A Word of Caution

A special word of caution needs to be emphasized when changing over to mobile systems. Many legacy access control systems require the use of backend portal accounts.

Don’t Reinvent the Wheel

Don’t Reinvent the Wheel

As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a heavy reliance on the network.

capital one card

Capital One Breach Jeopardizes Data of Over 100 Million People

A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.

small plane flying

Department of Homeland Security Issues Cybersecurity Warning for Small Planes

Planes using networked communication systems are particularly vulnerable to cyberattacks, according to a flaw discovered by researchers.

siri app

Apple Contractors Regularly Overhear ‘Confidential’ Conversations Through Siri, Whistleblower Says

An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.

At Least Four People Killed in Shootings at Festivals in California and New York

At Least Four People Killed in Shootings at Festivals in California and New York

The Gilroy, California police chief credited his department’s robust security operation with stopping the shooter in his tracks.

voter line

Senate Committee Releases Bipartisan Report on Election Security Threats

The report comes as Senate Republicans move to block election security legislation, arguing that election officials have already fixed the security issues they experienced in 2016.

skateboarder on street

Security Guard Suffers Permanent Brain Damage After Fight With Skater

Skateboarders are re-examining a culture of conflict with security guards in the wake of a tragic incident between a professional skater and a guard in San Francisco.

Using Zero Trust and Conditional Access Policies to Reshape Cybersecurity

Using Zero Trust and Conditional Access Policies to Reshape Cybersecurity

Eliminate trust based on location, such as within a company network, and always verify users at every access request.

public housing new york

Lawmakers Seek to Ban Biometric Recognition Technology in Public Housing

The legislation, which would ban facial recognition entry systems, would be the first to address what technology landlords can impose on residents.

camera drone

How Police Forces Are Using Drones to Keep Officers Out of The Line of Fire

California law enforcement is praising the use of drones and high-definition video surveillance to track suspects and strategize police responses.

medical data

Researchers: Your ‘Anonymous Data’ May Not Be As Anonymous After All

Americans could be signing over the keys to their identity when filling out medical forms that promise to “anonymize” their information, according to a new algorithm developed by scientists.

william barr

Attorney General Revives Feud With Tech Companies Over 'Warrant Proof' Encryption

Security experts and lawmakers say that creating a “backdoor” to unlock devices and messages would make those products vulnerable to hackers.

pivot3 logo

Pivot3 Delivers Real Time Access and Control to Mission-Critical Video Surveillance Environments

Major update offers security teams higher video stream density as well as reduced cost per desktop and video stream resulting in lower TCO and improved situational awareness.

amazon building

Orlando Police Department Ends Facial Recognition Pilot Program With Amazon

The city was never able to get the software, Rekognition, to consistently work with its video surveillance cameras over the course of 15 months.

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety