Critical Infrastructure


chicago subway

Lawmakers Warn Cities to Stop Contracting Chinese Companies To Build Transit Systems

Despite concerns about Chinese manufacturers having access to U.S. transportation data, cities continue to move ahead with plans to partner with state-owned companies.

natural gas pipeline

Natural Gas Pipeline Operator Shut Down Due To Ransomware Attack, DHS Reports

Through a “spearphishing link” sent to staff at the facility, hackers were able to deploy ransomware on the operational network, leading to a two-day shutdown.

washington metro

TSA, Washington Metro Test Out New System That Can Detect Explosive Devices on Passengers

The non-invasive system has been implemented by more transportation authorities around the world to address threats of terrorism in public spaces.

Reshaping the Perimeter

Driven by the 2013 physical assault on a California substation, the NERC CIP 14 regulation has reshaped the way energy’s physical security directors are viewing perimeter security.

Treasury Department Implements Sanctions on North Korean Cyber Groups

Treasury Department Implements Sanctions on North Korean Cyber Groups

The department announced the sanctions Friday after it said that North Korean intelligence groups targeted American critical infrastructure, particularly the financial system.

Paving the Way with Analytics

Paving the Way with Analytics

Technology—from street lights to telephones—has been at the heart of modern cities for more than a century.

Considerations for Infrastructure

Considerations for Infrastructure

Security is top of mind for consumers around the world and businesses across industries.

Paving Safer Roads

Paving Safer Roads

Though traffic and crime are not the only contributing factors that determine a location’s desirability, they are some of the top catalysts that inspire digital transformation within a city.



Protecting Mining and Quarry Operations

Protecting Mining and Quarry Operations

Natural resources being extracted at a mining or quarry operation not only have monetary value, but may also be critical components of medical, military, and industrial processes.

Meeting the Challenge

Around the world, the shipping and logistics industry has experienced immense operational growth and development.

The Tide of Security

The Tide of Security

Before installing a networked, open-platform, VMS solution, the Port of Antwerp had a standalone DVR system with no networking capabilities and no open platform support, meaning only a limited number of camera brands were supported.

Expanding Rural Infrastructure for Drones

Expanding Rural Infrastructure for Drones

Drones can provide significant benefits for residents and business in rural areas: delivering medical supplies, collecting data on the status of crops, aiding in search and rescue efforts.

Processing Security

Processing Security

The surveillance technology initially installed at the site was triggered by outdoor motion sensors that activated any one of several PTZ cameras for verification—unfortunately this set-up generated far too many false alarms to be effective.

Be Strong

Be Strong

Looking at examples of how municipalities or governments protect these assets can help businesses plan as well. Critical infrastructure for businesses often shares similar needs with municipalities: how do we best protect servers, structures and the people who live and work in private buildings?

Transforming Security

Transforming Security

Empresa Eléctrica de Guatemala (EEGSA Group) required a video surveillance system that could digitize the security footage on its substations to help avoid damage to its own infrastructure as well as electrocution hazards for people trying to access these places without warning or authorization.

The Right Fit

The Right Fit

Standalone systems, where certain access points are equipped with card readers but are not connected to a larger network, can provide a cost-effective access control solution.

Malware Targets Industrial Safety Systems

Security firm FireEye disclosed Thursday the existence of a malware used to compromise industrial control systems and disable their safety systems to potentially cause physical damage.

Time for an Upgrade

Time for an Upgrade

When a regional traffic management center in Washington state outgrew its building—as well as the size of its roadway monitoring system— the staff realized it was time not just for a physical upgrade, but a technological one, too

Eight Injured After Car Crashes into Crowd in Philadelphia

Eight Injured After Car Crashes into Crowd

The driver, whose SUV hopped the sidewalk, sending it straight into partygoers, will be charged with DUI.

Green Airport Cameras

Green Airport Cameras

The environmental impact of air travel is no secret. While designing more fuel-efficient aircraft and other conservation measures to reduce CO2 emission are on the drawing boards, the real progress is happening in the greening of airport terminals around the country.

Featured

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.