Government Security


NSA May Have Used Second-rate Domains for Cyber Espionage

NSA May Have Used Second-rate Domains for Cyber Espionage

Malware activated as soon as the device is plugged in; no further action required.

Secret Service Agents Disrupted Bomb Investigation at White House

Secret Service Agents Disrupted Bomb Investigation at White House

The two agents had been drinking when they reportedly drove directly beside the suspicious package.

Secret Service Agents Allegedly Crash into White House Barrier While Drinking

Secret Service Agents Allegedly Crash into White House Barrier While Drinking

The Department of Homeland Security is investigating the incident.

Secret Meeting Reveals How to Break Apple

Secret Meeting Reveals How to Break Apple's Security

Security researchers meet to discuss tactics and strategies for exploiting security flaws in iPhones and iPads.

Clinton

Clinton's E-mail System Not As Secure As Intended

A misconfigured encryption system left it vulnerable to hacking.

Security flaw from the ‘90s is still a problem today

Security flaw from the '90s is still a problem today

The flaw leaves Apple and Android users vulnerable.

Utah System of Higher Education Requests $2 Million for Security

Utah System of Higher Education Requests $2 Million for Security

Higher education leaders are asking the state for more money to help protect universities from IT security threats.

Secret Service Investigating Two White House Security Breaches

Secret Service Investigating Two White House Security Breaches

The Secret Service is investigating two separate instances that have occurred in the last 24 hours.



Attorney General Says US Malls Should Increase Security

Attorney General Says U.S. Malls Should Increase Security

Holder suggests increasing staff, cameras and other techniques

U.S. Secret Service to Conduct Drone Exercises

U.S. Secret Service to Conduct Drone Exercises

Announced in a statement of two paragraphs totaling less than 100 words.

Mall of America could be affected if Homeland Security Funds Run Out

Mall of America could be affected if Homeland Security Funds Run Out

Like so many other large operations across the country, the mall is partially funded by Homeland Security.

Oscars Brought Heightened Security Like Never Before

Oscars Brought Heightened Security Like Never Before

With an underground bunker, LAPD officers, FBI, Department of Homeland Security and snipers, yearly award ceremony went off without a hitch.

Mall of America Heightens Security after Al-Shabab Threat

Mall of America Heightens Security after Al-Shabab Threat

A video posted online called for attacks against the mall.

U.S. and Britain Work Together to Pull off SIM Card Heist

U.S. and Britain Work Together to Pull off SIM Card Heist

Intelligence agencies can intercept and decrypt communications without informing wireless network providers, foreign governments or the individual user.

Google Removes ‘How Can I Join ISIS’ Autosuggestion

Google Removes 'How Can I Join ISIS' Autosuggestion

The search phrase was giving people advice for joining the radical group.

TSA Reports Record-setting Number of Firearms Found at Airports

TSA Reports Record-setting Number of Firearms Found at Airports

Thousands discovered with the majority of them loaded.

Denmark Outlines Security Funding after Terror Attacks

Denmark Outlines Security Funding after Terror Attacks

The government is also looking to prevent young people from becoming radicalized.

Report Claims U.S. Embedded Spyware Overseas

Report Claims U.S. Embedded Spyware Overseas

The United States may have permanently embedded surveillance and sabotage tools in a variety of networks.

U.S. Allies and Friendly Nations Can Purchase Drones from the Government

U.S. Allies and Friendly Nations Can Purchase Drones from the Government

Drone strikes integral part of global warfare.

Obama Recruiting Tech Companies for Cybersecurity

Obama Recruiting Tech Companies for Cybersecurity

Executive actions aim to increase information sharing among private sector companies and federal law enforcement.

US Navy Introduces Firefighting Robot

US Navy Introduces Firefighting Robot

SAFFiR and his drone sidekick, Damage Control Technologies, help keep sailors out of direct exposure to fire.

Obama’s Security Strategy Features Robust Leadership, Limitations

Obama’s Security Strategy Features Robust Leadership, Limitations

The President’s second, and final, national security strategy focuses on limiting how much the United States can shape world events.

How Safe is Taxpayer Data?

How Safe is Taxpayer Data?

Several technologies are available that help detect misuse of taxpayer information.

Black Hawk Helicopters and Massive X-ray Machines to Attend Big Game this Sunday

Black Hawk Helicopters and Massive X-ray Machines to Attend Big Game this Sunday

Government agencies team up to ensure players, coaches, staff and attendees are safe and secure.

Obama Responds to White House Drone Security Breach

Obama Responds to White House Drone Security Breach

What the U.S. President said while in India plus a little drone trivia.

Drone Found on White House Grounds

Drone Found on White House Grounds

Officials say there is not an ongoing threat after the drone was discovered overnight.

NYPD Increases Security over Charlie Hebdo

NYPD Increases Security over Charlie Hebdo

Stores in NYC that sold the Charlie Hebdo issue following the Paris attack are getting increased police protection.

Security Increased at US Military Bases in Europe

Security Increased at US Military Bases in Europe

Ongoing concerns about the return of Europeans to their home countries in Iraq and Syria led to raised security levels.

Obama Promotes Cybersecurity in State of the Union Address

Obama Promotes Cybersecurity in State of the Union Address

His emphasis was on protecting families, especially children.

Genetec to Support New Microsoft Cloud for Government Service

Addressing compliance and security requirements for U.S. public sector, U.S. state, local and federal government agencies can now host Genetec Cloud Services on New Microsoft Azure for government.

HID Global Shares Top Secure Identity Trends for 2015

Key trends for banks, hospitals, universities and federal agencies, as well as government ID, transportation, enterprise and retail applications.

Russia to Build New Weapons for Security

Russia to Build New Weapons for Security

Putin tours shooting range and sees futuristic weapons, now Russia to modernize their weapons.

U.K. Creates Closer Cyber Security Ties in Washington

U.K. Creates Closer Cyber Security Ties in Washington

The Prime Minister is lobbying President Obama this week.

Military Tightens Security at Base in Delaware after Drivers Raise Suspicion

Military Tightens Security at Base in Delaware after Drivers Raise Suspicion

Unknown suspects tried to probe the base for security weaknesses.

Military Tightens Password Security after Central Command Hack

Military Tightens Password Security after Central Command Hack

Officials have launched an investigation into the attack

Security Services on High Alert for Beheading Attack in Britain

Security Services on High Alert for Beheading Attack in Britain

Online discussions regarding the killing of soldiers and police lead to security services entering a state of high alert.

Monday Monologue of Security-related Issues

Monday Monologue of Security-related Issues

From one of the black boxes being retrieved from the AsiaAir flight crash to talks of speeding up nuclear talks, this is top news you need to know.

France to Mobilize 10,000 troops

France to Mobilize 10,000 troops

France is taking a number of measures in a reaction to last week’s terrorist attacks.

Drastic Security Measures being taken for Boston Marathon Bombing Trial

Drastic Security Measures being taken for Boston Marathon Bombing Trial

Armed boats and police dogs are just a couple of the ways officials are protecting the trial.

Policewoman Shot in Paris Following Attacks

Policewoman Shot in Paris Following Attacks

The gunman also reportedly robbed a gas station in the northern part of the country

12 Dead in Attack on Paris Newspaper

12 Dead in Attack on Paris Newspaper

Charlie Hebdo, a satirical newspaper, was the target of what many are calling a terrorist attack

The Security Pitfalls of Airport Worker Access

The Security Pitfalls of Airport Worker Access

Some of the biggest holes in airport security revolve around those that work there.

US Air Force Drone Fleet Fizzles

US Air Force Drone Fleet Fizzles

Military branch lacks manpower to meet growing demand for unmanned missions.

Border Security: At What Price?

Border Security: At What Price?

Aside from security on campus or in the K-12 environment, there is nothing more passionate than border security.

How to Stay off FAA

How to Stay off FAA's 'Naughty List' with Your Drone

Video gives tips and best practices for flying your unmanned aircraft.

North Korea’s Internet Restored amid US Hacking Dispute

North Korea's Internet Restored amid US Hacking Dispute

North Korea’s internet was down for several hours before being restored Tuesday.

Security Report says White House Needs New Fence

Security Report says White House Needs New Fence

The report also suggests that the Secret Service needs a new director from outside the organization

Dallas Police Department to Add 200 Body Cameras in January

Dallas Police Department to Add 200 Body Cameras in January

The DPD cites the need to increase transparency, accountability and community engagement.

National Cybersecurity Center of Excellence Looks to Israel for Advice

National Cybersecurity Center of Excellence Looks to Israel for Advice

The deputy director of the center is willing to look beyond his borders for cutting edge techniques

Police Raid Sydney Café

Police Raid Sydney Café

Police forces shot and killed a hostage-taker early Tuesday

Kenya President Makes Case for Tougher Security Law

Kenya President Makes Case for Tougher Security Law

The president cites a dangerous enemy in calling for a change.

Supreme Court of Canada Upholds Cellphone Search at Arrest

A 4-3 decision by the country's highest court said the evidence Toronto police found on a robbery suspect's phone, including a photo of a handgun and a draft text message which read in part, "We did it," should not be excluded.

UK Police Boost Security after Threat against Officers

UK Police Boost Security after Threat against Officers

Police in Birmingham, England received a threat Monday.

U.S. Prepares for Security Risks ahead of CIA Torture Report

U.S. Prepares for Security Risks ahead of CIA Torture Report

American agencies around the world prepare for possible threats related to the release of the report

New U.S. Guidelines Ban Profiling by Federal Law Enforcement

New U.S. Guidelines Ban Profiling by Federal Law Enforcement

Airport and border screening are exempt from the new rules.

FBI in Danger of “Going Dark” if not able to Tap Devices

FBI in Danger of “Going Dark” if not able to Tap Devices

Government agency attempts to stand its ground against political leader.

Sony Hack Exposes Social Security Numbers

Sony Hack Exposes Social Security Numbers

Social Security numbers appeared more than 1.1 million times in 601 publicly-posted files stolen by hackers.

NYPD Twitter Fail

NYPD Twitter Fail

Critics attack NYPD after on social media after "wehearyou Tweet comes out soon after Eric Garner decision.

Body-mounted Camera Funding for Police Announced by Obama

Police shootings of youth and protests drive demand for video documentation of police activities.

Black Friday was the Second-Biggest Day Ever for Background Checks

Black Friday was the Second-Biggest Day Ever for Background Checks

The FBI dealt with more background checks than ever since the week following the Sandy Hook school shooting

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3