Government


Vermont is the First State to Ban Chinese Tech

Vermont is the First State to Ban Chinese Tech

In the next big move against Chinese technology, the State of Vermont has banned the tech.

Air Force Academy Invests in Thousands of Security Cameras

Air Force Academy Invests in Thousands of Security Cameras

The U.S. Air Force Academy is increasing cadet safety and security with the installation of security cameras.

California Introduces New Bill to Enhance Data Breach Notification Laws

California Introduces New Bill to Enhance Data Breach Notification Laws

California already has some of the strongest data breach laws in the U.S., but thinks it can do better.

Rhode Island City Considering Security Upgrades for Government Building

Rhode Island City Considering Security Upgrades for Government Building

A City Hall in Providence, Rhode Island might be getting a boost in security.

Cybersecurity Preparations for 2020 Election Underway

Cybersecurity Preparations for 2020 Election Underway

The director of Homeland Security's cybersecurity agency said on Wednesday that election security officials should prepare for all possibilities.

Defense Intelligence Agency Report Aims to Educate on Space Security

Defense Intelligence Agency Report Aims to Educate on Space Security

The Defense Intelligence Agency has released a new report detailing the security challenges the United States face in outer space.

Oklahoma Ramps Up Security in Capitol Building

Oklahoma Ramps Up Security in Capitol Building

Oklahoma leaders announce new security measures for the Capitol, including guard stations and banning public access to stairwells.

NASA Faced Cybersecurity Threats During Government Shutdown

NASA Faced Cybersecurity Threats During Government Shutdown

According to Renee Wynn, NASA’s Chief Information Officer, NASA’s Security Operations Center (SOC) continued to operate 24/7 during the government shutdown, fighting cybersecurity threats.



Securing the State of the Union Address

Securing the State of the Union Address

Several agencies work together to create a comprehensive security plan to protect the State of the Union.

San Francisco Looking to Ban Facial Recognition Tech

San Francisco Looking to Ban Facial Recognition Tech

A proposed ban in San Francisco has introduced a series of rules that could dramatically limit enhanced surveillance.

A Profile in Partnership

A Profile in Partnership

Microwave sensors, also known as Radar, RF or Doppler sensors, detect walking, running or crawling human targets in outdoor environments.

Cabling our Government

Cabling our Government

The government commands a lot of information in data centers, local municipalities, homeland security, health, and every touch that governments have with private citizens and companies. The data can be classified, private and public-facing as in forms.

Crimes on Campus

Crimes on Campus

College and university campuses aren’t immune from the same types of crime, such as burglary and assault, found in any small city where thousands of people live and work closely together. Yet overall, campuses remain a mostly safe place for young adults to learn and mature.

The Long Reach of Government Security

The government has its fingers in everything, and it is necessary when you think about managing the nation’s infrastructure. Think carefully about securing the nation’s transportation system.

Introducing Kessel Run to DOD

Everyone wants a piece of Kessel Run, the Air Force’s agile software development program, and attempts to replicate its success of are already underway.

Adding Sound and Safety

Adding Sound and Safety

At JFK Airport, immigration officers process hundreds of international passengers per flight. With the continual influx of people combined with limited staffing, law enforcement personnel are increasingly looking for technologies to enhance their efforts to deter illegal entry or trafficking and aid in crime investigation.

Ohio County Plans to Increase Courthouse Security

Ohio County Plans to Increase Courthouse Security

Rural Ohio County works to increase security at courthouse.

The “Other” Government Shutdown Cybersecurity Risk

The “Other” Government Shutdown Cybersecurity Risk

Many furloughed employees still have access to government IT networks and systems, which makes them prime targets for criminals and nation states who are constantly seeking to steal credentials for accessing government IT systems and data.

Securing Transportation

Securing Transportation

In today’s connected world, Intelligent Transportation Systems (ITS) play vital roles managing our Nation’s critical infrastructure including roadways, interstates, intersections, ports, mass transit lines, city traffic, and urban mobility.

Sensitive Files Exposed in Oklahoma Securities Commission Data Leak

Sensitive Files Exposed in Oklahoma Securities Commission Data Leak

Millions of sensitive files were discovered on an unprotected server belonging to a state level agency.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3