Emerging Technologies


Brend

Law Enforcement Technology Matches Sketches to Mug Shots

Researchers at Michigan State University's Pattern Recognition and Image Processing Lab have developed new software that will allow officers to narrow the field of suspects using forensic sketches.

avatar kiosk

Facial Lie Detection Tech Being Developed for Airports, Border Crossings

The AVATAR kiosk uses non-invasive artificial intelligence and sensor technologies to gauge suspicious behavior.

Galileo Processing Unveils Cloud Computing for Payment Processing

Galileo Processing Inc. has announced a new suite of solutions that enable payment card-issuing banks and payment card program managers to leverage the power of cloud computing while ensuring they meet required levels of security, performance, availability and regulatory compliance.

SelectaDNA90x90

“Invisible Ink” Can Help Deter Metal Theft, Burglaries

Scrap metal is a hot commodity these days. Two U.K. companies have come up with invisible, nearly indestructible marking substances that companies and individuals can use to mark their belongings to prevent theft and facilitate recovery.

NEC Launches Contactless Scanner That Acquires Fingerprint and Finger Vein Data

NEC Corporation has introduced a device to simultaneously acquire fingerprint and finger vein characteristics without physical contact. Worldwide shipment of the HS100-10 Contactless Hybrid Finger Scanner (HS100-10) is scheduled to begin in May 2011.

MasterCard Boosts Security in its Payment Cards

NagraID Security, a Kudelski Group company, MasterCard Worldwide and Symantec Corp. have teamed up to introduce the MasterCard Display Card, which brings stronger authentication functionality on a payment card to the United States.

Healthcare Network Migrates to Contactless, Multi-application Access Control

HID Global has enabled the Albert Einstein Healthcare Network (AEHN) to re-badge more than 7,000 personnel following the firm’s spin-off and corporate re-branding, while also migrating to higher-security 13.56 MHz contactless technologies.

Oberthur Technologies Provides EMV Chips for SECU Debit Cards

Oberthur Technologies will provide the non-profit cooperative with the technology needed for its EMV migration. While there is widespread adoption of the new technology worldwide, virtually none of the more than one billion chip cards in circulation are in the United States.



SAIC and UMBC Launch Inaugural Cyber Challenge and Conference

The Maryland Cyber Challenge and Conference (MDC3), to be held Oct. 21-22, will strengthen Maryland's position as a cybersecurity leader by bringing teams of current and prospective cybersecurity professionals together to develop the skills and techniques needed to protect vital information systems.

Future Forensics: Recovering Fingerprints from Fabrics

New research seeks to recover fingerprint ridge detail and impressions from fabrics -- a technique that has up until now proved difficult.

A Conversation with Tyco's Tim Von Kaenel and John Welter

Tyco unveiled its traffic intelligence solutions at the National Retail Federation’s Big Show this month in New York. We sat down to talk with Tim Von Kaenel, Tyco’s senior director for solution management of the retail solutions group, and John Welter, senior manager of product solutions for TYCO’s traffic intelligence suite, about the solutions and how the technology was received at the show.

Wolfhound PRO

BVS to Unleash Latest in Line of Contraband Cell Phone Detectors

The Wolfhound-PRO is the third in a line of BVS' award-winning cell phone detection products and the most sensitive.

HID Taps Jean-Miguel Robadey to Head New RIFD Animal Tagging Venture

As global director, Robadey will be responsible for extending HID’s two-decades-long leadership in RFID tagging into the rapidly growing market for solutions that improve the traceability of individual animals through the supply chain.

Aimetis Symphony First VMS with Analytics to Support Axis' Corridor Format

Axis’ corridor format gives a vertically oriented, 9:16 video stream from the camera, perfectly adapted to a narrow monitored area.

Sourcefire Acquires CloudBased AntiMalware Company Immunet

Cybersecurity solutions provider Sourcefire Inc. has acquired Immunet, a provider of advanced, cloud-based anti-malware technologies. The acquisition expands Sourcefire’s security solutions portfolio, adding an advanced cloud platform for delivery of malware protection.

Identity checking can be a time-consuming process at border crossings.

HID Global Fuels e-Passport and e-ID Adoption in Europe

RFID reader technology deployments expand role in the accelerating buildout of the worldwide e-Passport, e-Visa and e-ID infrastructure.

Oregon Team Wins Siemens Competition with Emotion Recognition Project

Akash Krishnan and Matthew Fernandez of Portland, Ore., have filed for a provisional patent and have attracted the interest of the U.S. government.

Bomb precursor chemicals

Japan to Test Hitachi Explosive-sensing Device at Train Station

In conjunction with the Asia-Pacific Economic Cooperation summit, the government is further testing the bomb detector and checking for false positives.

NYU-Poly Contest Unearths Cyber Security Research

Judges tap 10 doctoral candidates as finalists for AT&T Research Award.

Advanced imaging technology is designed to bolster security by safely screening passengers for metallic and non-metallic threats—including weapons, explosives and other objects concealed under layers of clothing.

Commercial Pilot Barred After Refusing Full-Body Scan

“Deploying advanced imaging technology at these airports strengthens our ability to protect the traveling public in the face of evolving threats to aviation security,” said Department of Homeland Security Secretary Janet Napolitano.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.