Top Stories


Validate Your Security Model

Validate Your Security Model

As security threats grow in complexity and scale, organizations are spending major resources to address the threats and minimize risk, including hiring top security talent and purchasing sevenfigure security solutions.

Common Mistakes

As the cyber threat landscape has matured and evolved, cybersecurity incidents have become a regular occurrence.

Ohio County Taps Startups for Automation

Officials in Cuyahoga County, Ohio are looking to digitize and automate paper-based processes at several agencies through a program that encourages governments, startups and small businesses to collaborate on solutions.



Implementing Commercial Security

Commercial buildings face a universal challenge: how to manage security without encroaching on tenant privacy, comfort and experience.

Policy Bill Includes Cyber Investments

Data on OTAs and prototypes. The House proposed an annual reporting requirement on how the Defense Department is using OTAs.

All About the Data

All About the Data

When you consider today’s smartphones, the phone part is almost ancillary. It’s really the apps and the advanced optics that drive the purchase.

Surviving The Tough Times

Dayton, Ohio, has seen a lot of ups and downs over the years. The city is more than a survivor as businesses find a way to keep their doors open, and today, even attract some very interesting tech firms.

It Takes a Village

It Takes a Village

As the city began strategically deploying surveillance cameras throughout Atlanta, APF invested $350,000 to create the cuttingedge Loudermilk Operation Shield Video Integration Center (VIC).

This is Big Business

This is Big Business

When it comes to government contracting, security spending is big business—and small business too.

Transforming the Industry

Transforming the Industry

Artificial Intelligence (AI) continues to gain momentum every day, and it is already poised to augment and enrich many aspects of our business and personal lives.

Essential Management

Essential Management

There are essential elements that great integrators and managed service providers have that set them apart from the competition.

Airport IoT Operations

The Internet of Things (IoT) has landed in airport operations. More than 20 billion end devices are already networked via the Internet, and there will likely be three times more than this by 2025, according to Statista.

Transforming Healthcare Security

Transforming Healthcare Security

Security is a top priority at healthcare facilities across the country, but developing and deploying an effective healthcare security strategy is a challenging process.

Defining Performance Criteria

Defining Performance Criteria

There are good reasons that video surveillance is mandated for any casino operation by both federal and state gaming authorities – it has proven to be an effective tool to help ensure safety,

Reconsidering Used Equipment

Reconsidering Used Equipment

Once you have made the decision to install a security entrance, you may find that your search for a provider brings you to used turnstiles, revolving doors or portals for sale. Naturally, these tend to be cheaper than new products.

cyber command center

Documents Reveal Why U.S. Military Publishes Malware Used by North Korean and Russian Hackers

CYBERCOM has created a Twitter account with thousands of followers to publicize malware samples it shares with cybersecurity companies. Internal documents explain that it’s part of a defensive (and offensive) strategy.

miller brewery

Employee Who Frequently Argued With Colleagues Kills Five At Milwaukee’s Miller Brewery

The gunman, who took his own life after shooting and killing five others, had frequent conflicts with his coworkers.

capitol hill building

Lawmakers Plan Bill That Would Endanger Tech Company Efforts to Implement Full Encryption

The legislation reflects growing frustration from the Justice Department about the encryption practices of tech companies, particularly when it comes to investigating child abuse or terrorist activity.

Featured

  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.