Government


Hackers Breach White House Computers

Hackers Breach White House Computers

The hackers are thought to be working for the Russian government.

Security Situation Investigated on Flight to Charlotte

Security Situation Investigated on Flight to Charlotte

Passengers were stranded for more than an hour after their plane landed.

Apple CEO Discusses Privacy Talks with Chinese Government

Apple CEO Discusses Privacy Talks with Chinese Government

Tim Cook said the talks were ‘very open’

Obama Says Ebola is a National Security Threat

Obama Says Ebola is a National Security Threat

The President says the issue has a low margin for error in his statement regarding the disease.

Russian Hackers are Using Microsoft Windows to Spy

Russian Hackers are Using Microsoft Windows to Spy

The hackers are targeting the Ukrainian government, a European government agency, two European companies and a United States scholar.

Japan Court Orders Google to Remove Search Results

Japan Court Orders Google to Remove Search Results

The court ordered Google to remove results of a man’s unflattering past.

Twitter Files Suit over National Security Data

Twitter Files Suit over National Security Data

Social media giant feels First Amendment right has been violated.

Man Posing as Member of Congress Gets Access to Secure Area at Obama Event

Man Posing as Member of Congress Gets Access to Secure Area at Obama Event

An unidentified man was able to get access to a secure area backstage at an appearance by the president



Interim Secret Service Director Admits They Have Work to Do

Interim Secret Service Director Admits They Have Work to Do

Joseph Clancy has admitted that they “know they’ve got to clean up their act”

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

Secret Service Allowed Armed Man with Criminal Record on Elevator with President

The man was a security contractor with three prior convictions for assault and battery.

Leveraging IT for Access Control

Trying to navigate through the numerous security regulations that are in place for government agencies and facilities can be a daunting challenge, even to the most seasoned security professionals.

Historic Southern City Upgrades to High-Tech Traffic Management

Savannah, Georgia is a study in contrast. As the state’s oldest city, it was founded long before the American Revolution. Yet, beneath its cobblestoned streets lies 38 miles of fiber optic cable, evidence of a metro-region firmly rooted in modernity.

A Capitol Idea

California’s historic State Capitol building, completed in Sacramento in 1874, has seen its share of serious security episodes during its colorful existence. In 1927, a lobbyist shot and murdered a secretary on the fourth floor.

The Cloud Can Change Everything for Law Enforcement

Many people envision law enforcement agencies around the country as resembling mythical portrayals on TV and in movies, with leading-edge technology that can track every suspect’s move across the grid.

USSS Director Writes Testimony Regarding White House Perimeter Breach

USSS Director Writes Testimony Regarding White House Perimeter Breach

Director Pierson brings up some new concerns about the Secret Service.

Secret Service Reviews White House Security after Intruder Enters Mansion

Secret Service Reviews White House Security after Intruder Enters Mansion

A military vet who served three tours in Iraq jumped the White House fence and entered the front door

Security Industry Grows in Kenya after Westgate Attack

Security Industry Grows in Kenya after Westgate Attack

The attack on the Westgate shopping mall has led to boosted business in the private security industry.

FBI Facial Recognition System Completed

FBI Facial Recognition System Completed

After three years of development, system allows agents to search photographs to identify criminals.

Police Department Debuts Body Cameras on Officers

Police Department Debuts Body Cameras on Officers

This in response to police department's "Stop and Frisk" policies being challenged by civil rights groups in court.

Enough to Go Around

Some of the most satisfying applications of sophisticated security technologies have little to do with security. Today, biometric identity management plays a critical role in delivering necessary vaccines to children in the developing world.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3