Government


A Look at Sharm el Sheik Airport Security after Plane Crash

A Look at Sharm el Sheik Airport Security after Plane Crash

A look at the security of the airport in which Russia's deadliest aviation disaster departed from.

IT Security Compliance for Cloud Service Providers

KPMG and BalaBit have released the results of study involving IT service providers.

High Profile Events

Realizing the need for stronger surveillance in high-profile locations such as the marathon route, the city of Boston decided to increase civilian protection. The new security measures included doubling law enforcement personnel to about 3,500, the addition of bomb-sniffing dogs, and a SWAT team provided by the FBI.

Will-Burt Company Security System Earns Top Honors

Company's security system placed on GSA Approved Products List 2.

Is It Possible to Have Security on Every Flight?

Is It Possible to Have Security on Every Flight?

Is security on board the answer to the high rise in incidents on planes?

Millions of Americans May Need Passports to Fly Domestic

Millions of Americans May Need Passports to Fly Domestic

State issued identification cards from four states will no longer be accepted for domestic flights starting in 2016.

Why Tech’s Biggest Companies are Against the Cyber Security Bill

Why Tech's Biggest Companies are Against the Cyber Security Bill

Some of technologies leading revolutionaries disregard the Cyber Security Bill as a legitimate solution to the data breaches seen in recent news.

KJB Security Products named North American distributor for LawMate International

A full range of products for law enforcement, military and government now available to KJB's network of government agencies and retailers.



Apprio Appoints Sallie Sweeney as New Chief Information Security Officer

Sweeny is regarded as an information security field expert and brings more than 18 years of technology experience to Apprio.

ASIS Supports Chula Vista Body Camera Program

ASIS Supports Chula Vista Body Camera Program

Local security professionals are in support of the Chula Vista Police Department’s program.

Global Mobile Networks are Vulnerable to Security Bugs

Global Mobile Networks are Vulnerable to Security Bugs

A new study shows how mobile networks around the world have been hacked via bugs in the code.

Israel Deploys Troops to Bolster Security

Israel Deploys Troops to Bolster Security

The nation is on high alert after a number of violent incidents.

Delta Scientific Crash Barriers Used during Pope’s Visit

Delta Scientific Crash Barriers Used during Pope's Visit

The MP5000 portable crash barriers were used during Pope Francis’s visit to the U.S.

Keeping the Pope Secure on U.S. Soil

Keeping the Pope Secure on U.S. Soil

It’s not every day the Pope shows up for a visit, but when he does arrive in the United States, security is in the front of everyone’s mind.

Border Patrol Scores in Marijuana Bust

Border Patrol Scores in Marijuana Bust

Border Patrol agents assigned to the Rio Grande Valley Sector seized more than 1,400 pounds of marijuana Monday.

Fight Against Hunger

Fight Against Hunger

Nearly 800,000 people in Colorado struggle with hunger. The Food Bank of the Rockies has been leading the fight against hunger throughout Metro Denver, rural Colorado, the Western Slope and in Wyoming for the past 36 years.

Improving Building Security

The city of Lakeland, Fla., has recently standardized its security operations with a unified security platform that combines video surveillance, access control and automatic license plate recognition systems into one central monitoring and management platform.

Tackling the Challenges

Tackling the Challenges

Like virtually every municipality across the country, Moreno Valley in Southern California’s Riverside County has faced budget and security challenges over the past decade.

A Case in Point

A Case in Point

Located in Southern California, the city of Santa Ana is home to more than 330,000 people, making it the second largest city in Orange County and the 11th largest city in the state.

Online Exclusive: Complying with Stringent Requirements

Online Exclusive: Complying with Stringent Requirements

Every level of government developing ways to deal with physical security as well as the data their program produce.

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.