Government


Air Force Academy Invests in Thousands of Security Cameras

Air Force Academy Invests in Thousands of Security Cameras

The U.S. Air Force Academy is increasing cadet safety and security with the installation of security cameras.

California Introduces New Bill to Enhance Data Breach Notification Laws

California Introduces New Bill to Enhance Data Breach Notification Laws

California already has some of the strongest data breach laws in the U.S., but thinks it can do better.

Rhode Island City Considering Security Upgrades for Government Building

Rhode Island City Considering Security Upgrades for Government Building

A City Hall in Providence, Rhode Island might be getting a boost in security.

Cybersecurity Preparations for 2020 Election Underway

Cybersecurity Preparations for 2020 Election Underway

The director of Homeland Security's cybersecurity agency said on Wednesday that election security officials should prepare for all possibilities.

Defense Intelligence Agency Report Aims to Educate on Space Security

Defense Intelligence Agency Report Aims to Educate on Space Security

The Defense Intelligence Agency has released a new report detailing the security challenges the United States face in outer space.

Oklahoma Ramps Up Security in Capitol Building

Oklahoma Ramps Up Security in Capitol Building

Oklahoma leaders announce new security measures for the Capitol, including guard stations and banning public access to stairwells.

NASA Faced Cybersecurity Threats During Government Shutdown

NASA Faced Cybersecurity Threats During Government Shutdown

According to Renee Wynn, NASA’s Chief Information Officer, NASA’s Security Operations Center (SOC) continued to operate 24/7 during the government shutdown, fighting cybersecurity threats.

Securing the State of the Union Address

Securing the State of the Union Address

Several agencies work together to create a comprehensive security plan to protect the State of the Union.



San Francisco Looking to Ban Facial Recognition Tech

San Francisco Looking to Ban Facial Recognition Tech

A proposed ban in San Francisco has introduced a series of rules that could dramatically limit enhanced surveillance.

A Profile in Partnership

A Profile in Partnership

Microwave sensors, also known as Radar, RF or Doppler sensors, detect walking, running or crawling human targets in outdoor environments.

Cabling our Government

Cabling our Government

The government commands a lot of information in data centers, local municipalities, homeland security, health, and every touch that governments have with private citizens and companies. The data can be classified, private and public-facing as in forms.

Crimes on Campus

Crimes on Campus

College and university campuses aren’t immune from the same types of crime, such as burglary and assault, found in any small city where thousands of people live and work closely together. Yet overall, campuses remain a mostly safe place for young adults to learn and mature.

The Long Reach of Government Security

The government has its fingers in everything, and it is necessary when you think about managing the nation’s infrastructure. Think carefully about securing the nation’s transportation system.

Introducing Kessel Run to DOD

Everyone wants a piece of Kessel Run, the Air Force’s agile software development program, and attempts to replicate its success of are already underway.

Adding Sound and Safety

Adding Sound and Safety

At JFK Airport, immigration officers process hundreds of international passengers per flight. With the continual influx of people combined with limited staffing, law enforcement personnel are increasingly looking for technologies to enhance their efforts to deter illegal entry or trafficking and aid in crime investigation.

Ohio County Plans to Increase Courthouse Security

Ohio County Plans to Increase Courthouse Security

Rural Ohio County works to increase security at courthouse.

The “Other” Government Shutdown Cybersecurity Risk

The “Other” Government Shutdown Cybersecurity Risk

Many furloughed employees still have access to government IT networks and systems, which makes them prime targets for criminals and nation states who are constantly seeking to steal credentials for accessing government IT systems and data.

Securing Transportation

Securing Transportation

In today’s connected world, Intelligent Transportation Systems (ITS) play vital roles managing our Nation’s critical infrastructure including roadways, interstates, intersections, ports, mass transit lines, city traffic, and urban mobility.

Sensitive Files Exposed in Oklahoma Securities Commission Data Leak

Sensitive Files Exposed in Oklahoma Securities Commission Data Leak

Millions of sensitive files were discovered on an unprotected server belonging to a state level agency.

Stop the Bleed Campaign Proves to be Working Following Shooting in Utah

Stop the Bleed Campaign Proves to be Working Following Shooting in Utah

Victims in a Utah mall shooting arrived at the hospital with tourniquets, a life-saving measure frequently taught in Stop the Bleed courses.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3