Government Security


U.S. Military Warned about ISIS Threat within America’s Borders

U.S. Military Warned about ISIS Threat within America’s Borders

FBI gains fresh intelligence and issues a security bulletin last night.

Philadelphia Readies for Papal Security Challenge

Philadelphia Readies for Papal Security Challenge

The Pope’s visit to the city will be the largest event in its modern history.

Do Not Post Pictures of Your Completed Ballot on Social Media

Do Not Post Pictures of Your Completed Ballot on Social Media

Steep fines are being issued and some are having their votes invalidated.

European Union Holds Largest-Ever Cyber-Security Exercise

European Union Holds Largest-Ever Cyber-Security Exercise

The European Network and Information Security Agency coordinated an exercise based in Athens.

US Heightens Security at Federal Buildings Nationwide

US Heightens Security at Federal Buildings Nationwide

Responding to recent fatal shooting at Canadian Parliament building, security measures are stepping up in America.

Hackers Breach White House Computers

Hackers Breach White House Computers

The hackers are thought to be working for the Russian government.

Security Situation Investigated on Flight to Charlotte

Security Situation Investigated on Flight to Charlotte

Passengers were stranded for more than an hour after their plane landed.

Apple CEO Discusses Privacy Talks with Chinese Government

Apple CEO Discusses Privacy Talks with Chinese Government

Tim Cook said the talks were ‘very open’



Gunman Shot Down inside Canada’s Parliament Building

Gunman Shot Down inside Canada’s Parliament Building

It is unclear as to whether there are others in the area.

Obama Says Ebola is a National Security Threat

Obama Says Ebola is a National Security Threat

The President says the issue has a low margin for error in his statement regarding the disease.

Russian Hackers are Using Microsoft Windows to Spy

Russian Hackers are Using Microsoft Windows to Spy

The hackers are targeting the Ukrainian government, a European government agency, two European companies and a United States scholar.

Japan Court Orders Google to Remove Search Results

Japan Court Orders Google to Remove Search Results

The court ordered Google to remove results of a man’s unflattering past.

Twitter Files Suit over National Security Data

Twitter Files Suit over National Security Data

Social media giant feels First Amendment right has been violated.

Man Posing as Member of Congress Gets Access to Secure Area at Obama Event

Man Posing as Member of Congress Gets Access to Secure Area at Obama Event

An unidentified man was able to get access to a secure area backstage at an appearance by the president

Interim Secret Service Director Admits They Have Work to Do

Interim Secret Service Director Admits They Have Work to Do

Joseph Clancy has admitted that they “know they’ve got to clean up their act”

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

The man was a security contractor with three prior convictions for assault and battery.

Leveraging IT for Access Control

Trying to navigate through the numerous security regulations that are in place for government agencies and facilities can be a daunting challenge, even to the most seasoned security professionals.

Historic Southern City Upgrades to High-Tech Traffic Management

Savannah, Georgia is a study in contrast. As the state’s oldest city, it was founded long before the American Revolution. Yet, beneath its cobblestoned streets lies 38 miles of fiber optic cable, evidence of a metro-region firmly rooted in modernity.

A Capitol Idea

California’s historic State Capitol building, completed in Sacramento in 1874, has seen its share of serious security episodes during its colorful existence. In 1927, a lobbyist shot and murdered a secretary on the fourth floor.

The Cloud Can Change Everything for Law Enforcement

Many people envision law enforcement agencies around the country as resembling mythical portrayals on TV and in movies, with leading-edge technology that can track every suspect’s move across the grid.

USSS Director Writes Testimony Regarding White House Perimeter Breach

USSS Director Writes Testimony Regarding White House Perimeter Breach

Director Pierson brings up some new concerns about the Secret Service.

Secret Service Reviews White House Security after Intruder Enters Mansion

Secret Service Reviews White House Security after Intruder Enters Mansion

A military vet who served three tours in Iraq jumped the White House fence and entered the front door

Security Industry Grows in Kenya after Westgate Attack

Security Industry Grows in Kenya after Westgate Attack

The attack on the Westgate shopping mall has led to boosted business in the private security industry.

FBI Facial Recognition System Completed

FBI Facial Recognition System Completed

After three years of development, system allows agents to search photographs to identify criminals.

Police Department Debuts Body Cameras on Officers

Police Department Debuts Body Cameras on Officers

This in response to police department's "Stop and Frisk" policies being challenged by civil rights groups in court.

Enough to Go Around

Some of the most satisfying applications of sophisticated security technologies have little to do with security. Today, biometric identity management plays a critical role in delivering necessary vaccines to children in the developing world.

Columnist calls for public security cameras after the disturbances in Ferguson

Columnist calls for public security cameras after the disturbances in Ferguson

Larry Seltzer says that public security cameras could have helped the police gather information

German Artists Claim Responsibility for the White Flags on the Brooklyn Bridge

German Artists Claim Responsibility for the White Flags on the Brooklyn Bridge

Two artists say they made the flags themselves

Government Websites in Israel Hacked by Anonymous

Government Websites in Israel Hacked by Anonymous

In wake of recent bombings, activist group feels need to hack.

Security at the Department of Defense is Weaker than You Would Think

Security at the Department of Defense is Weaker than You Would Think

Security clearance is given to thousands of people who owe the IRS money.

A How-To Guide on Building a Federal Information Security Team

A How-To Guide on Building a Federal Information Security Team

Here is a list to help develop an all-star team of employees that will protect your information.

The Ultimate Cybersecurity Fix

The Ultimate Cybersecurity Fix

Typewriter sales in German economy boom as tool to thwart cyber spying.

Republican State Representative Wants Migrant Children Quickly Returned Home

Republican State Representative Wants Migrant Children Quickly Returned Home

"I think the first step to fix it is to give our CBP guys the authority to immediately repatriate them back to their countries," said Salmon, chairman of the U.S. House Foreign Affairs subcommittee on the Western Hemisphere and a member of the working group that U.S. House Speaker John Boehner, R-Ohio, assembled to address the crisis.

Facebook Facial Recognition Better than FBI

Facebook Facial Recognition Better than FBI's

Next Generation Identification (NGI) and DeepFace battle it out to prove who is the best at biometrics...so far, social media is winning.

Tighter Security Measures Sought for Airline Safety

Tighter Security Measures Sought for Airline Safety

Intelligence officials concerned about new al-Qaida effort to create a bomb that would go through airport security undetected.

UK Government Admits Spying Using Google, Facebook, Twitter

UK Government Admits Spying Using Google, Facebook, Twitter

What it all boils down to is internal vs. external cyber communications.

GovSec 2014 Attendance Grows 20 Percent

GovSec – the Government Security Conference and Expo, which featured TREXPO, the Law Enforcement Expo, and was held in conjunction with CPM East – saw its conference grow by 20 percent and total attendance reach more than 3,600 in 2014.

New Chinese Military Cyberattacks Discovered

New Chinese Military Cyberattacks Discovered

Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.

Security Stunt Pulled by Australian Politician in Parliament

Security Stunt Pulled by Australian Politician in Parliament

Wheat farmer pulls pipe bomb from bag, illustrating that government building security measures are failing. (Video Included)

Getting Harder to Report on Intelligence Agencies

Too soon to determine if directives are the real reason for sources to clam up.

FBI Releases 2013 Stats for Officers Killed in Line of Duty

FBI Releases 2013 Stats for Officers Killed in Line of Duty

All of the deaths except for one was caused by handguns, rifles and shotguns; does America have a gun problem?

Pentagon Prepared for Zombie Apocalypse

Pentagon Prepared for Zombie Apocalypse

U.S. government has everything under control in case of real-life, large-scale operations, emergencies and catastrophes.

Gallagher showcases

Gallagher showcases 'PIV solution with no bolt-ons' at GovSec

Gallagher Security, a global leader in the design and manufacture of innovative access control, intruder alarm and perimeter security systems, highlight its latest FIPS 201-2 compliant solution at GovSec 2014.

Security Products Announces The Govies Government Security Award Winners for 2014

Security Products Announces The Govies Government Security Award Winners for 2014

The staff at Security Products and Security Today wish all the winners a huge congratulations.

FBI Facial Recognition Database Contains Images of the Innocent

FBI Facial Recognition Database Contains Images of the Innocent

By 2015 Next Generation Identification (NGI) will have millions of stored facial images.

Improved Surveillance

Improved Surveillance

Port Fourchon plays a strategic role in supplying the United States with nearly 18 percent of its oil supply, servicing over 90 percent of the Gulf of Mexico’s deep-water exploration and production.

Government Procurement Challenges

Government Procurement Challenges

More than likely, you have witnessed an RFP that includes dated product specifications and, in some cases, multiple product specifications that are more “wish-list” than reality.

High-Tech Solutions

High-Tech Solutions

Nearly everyone is familiar with the standard manned guard booth in which a person sits and allows drivers in and out of a facility; however, border stations, government buildings, military bases and other locales where there can be a “very unwanted guest” all use much highertech security booths.

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

One might think that a military base is among the most secure places in the country. Unfortunately, though, the sprawling nature of military bases makes them difficult to secure effectively, which leaves these sites vulnerable to a wide range of threats.

EID Passport Continues to Expand Identity Management Customer Base in Government Sector

EID Passport Continues to Expand Identity Management Customer Base in Government Sector

Further integration with new facilities confirms trusted relationships.

DHS Re-evaluation of HSPD-12 Awards XTec 10 Year Contract

DHS Re-evaluation of HSPD-12 Awards XTec 10 Year Contract

Homeland Security Presidential Directive 12 (HSPD-12) called for the mandatory implementation of a government-wide standard for secure and reliable forms of identification for federal employees and contractors.

New Cybersecurity Guidelines Released by White House, Part 1

New Cybersecurity Guidelines Released by White House, Part 1

“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama.

Dilemma Over Drone Strikes Against American Citizens

Dilemma Over Drone Strikes Against American Citizens

Should the Obama administration kill an American citizen who is a member of al-Qaeda and is actively planning attacks against Americans overseas or legally build a case against him?

A Light of Freedom

A Light of Freedom

Security at the Statue of Liberty has never been taken for granted; it just hasn’t been a top priority of the government. That is not the case with the U.S. Park Police. They have used, to the best of their ability, security equipment that was appropriated but lacked the highest technology.

GovSec West Exhibitors Feature Several Products and Solutions

GovSec West Exhibitors Feature Several Products and Solutions

A comprehensive overview of this year's GovSec West 2013 Conference and Expo provided by the staff at Security Products magazine.

Lansing Lights up the Night More Safely with Samsung Video Surveillance

Lansing Lights up the Night More Safely with Samsung Video Surveillance

Samsung IP cameras ensure a safer and more secure Silver Bells Parade for the people of Michigan.

Drone Hunting Vote Postponed in Small Colorado Town

Drone Hunting Vote Postponed in Small Colorado Town

The vote that would allow Deer Trail, Colo. residents to gun down drones for money is postponed.

Honoring_man_peace_small

Honoring a Man of Peace

People from all over the world gathered in Dallas, Texas to remember a former US President who's life was prematurely ended.

Dr. Tania Glenn

PTSD Discussed at GovSec West

Dr. Tania Glenn discussed the aftereffects of terrorism and how companies can rebuild resilience and a positive attitude in their workforce.

GovSec West 2013

Gearing Up for GovSec West 2013

Anxiously awaiting for what tomorrow brings at the Gaylord Texan in Grapevine, Texas.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3