Top Stories


Drastic Security Measures being taken for Boston Marathon Bombing Trial

Drastic Security Measures being taken for Boston Marathon Bombing Trial

Armed boats and police dogs are just a couple of the ways officials are protecting the trial.

Monitor Dynamics Names REPMS Manufacturer's Rep for Northeast U.S.

iTRUST 2.0 POE+ powered, server-less, IP access control product launches and promoted in Metro New York, New Jersey and the New England area.

NSA Whistleblower Speaks with PBS about Digital Attacks

NSA Whistleblower Speaks with PBS about Digital Attacks

From his hotel room in Moscow, Edward Snowden has a thing or two to say about digital attacks. (Video included).



See What a Surveillance Camera Can Do

See What a Surveillance Camera Can Do

The funny side of video surveillance.

A Tweeter Invades College Coach

A Tweeter Invades College Coach's Privacy

Coach Sumlin of Texas A&M teaches college student the ultimate lesson about respecting the privacy of others.

Policewoman Shot in Paris Following Attacks

Policewoman Shot in Paris Following Attacks

The gunman also reportedly robbed a gas station in the northern part of the country

Taminco Chemicals Rely on Milestone for Employee Safety and Federal Regulation

Hazardous materials monitored through production and transportation.

Paxton Access to Release Net2 PaxLock

Secure, wireless, battery-operated, electronic lock that works with company's software for easy management of networked access control.

Hikvision Canada Inc. Established to Better Serve Needs of Canadian Market

Focus is on video surveillance with state-of-the-art technology and exceptional technical support.

Paxton Announces the Grand Opening of Their New Distribution Facility

Company provides IP, wireless and battery-powered access control solutions, providing electronic security for any site requirement.

Honeywell

Honeywell's Lyric Makes CES Debut

New way for families to stay in control of their home comfort and security while at home or away.

TSC Advantage Earns Homeland Security SAFETY Act Designation

Credential provides additional validation of TSC Advantage’s holistic approach to cyber risk assessment.

Gun Photo Posted on Facebook Causes Controversy

Gun Photo Posted on Facebook Causes Controversy

Jedidiah Duggar from TLC's hit show, "19 Kids and Counting," smiles whole posing with shotgun.

12 Dead in Attack on Paris Newspaper

12 Dead in Attack on Paris Newspaper

Charlie Hebdo, a satirical newspaper, was the target of what many are calling a terrorist attack

HD-COAXINATOR and the Legendary SecurityTronix 24/7/365 Support

HD-COAXINATOR and the Legendary SecurityTronix 24/7/365 Support

Offer HD video to clients for approximately the same cost as typical analog gear, with superior results.

Absolute Software to Track Devices

Google Maps to deliver accurate global geolocation tracking for Absolute Computrace.

Farpointe's MAXSecure Provides Increased Security

Card-based access control systems fight skimming, eavesdropping and relay attacks.

The Security Pitfalls of Airport Worker Access

The Security Pitfalls of Airport Worker Access

Some of the biggest holes in airport security revolve around those that work there.

Featured

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.