Top Stories


Relying on Power

Relying on Power

Mohegan Sun is a premier gaming and resort destination covering 185 acres of reservation land along the banks of the Thames River in the foothills of southeastern Connecticut. First opened on Oct. 12, 1996, Mohegan Sun can truly be classified as a mega- resort.

A Winning Security Plan

A Winning Security Plan

In the world of sports, oftentimes there’s as much action in the stands as there is on the floor. That’s why the Milwaukee Bucks felt it was so important to design their new stadium with a network of security cameras to safeguard the welfare of players and fans alike.

Moving to the Door

Moving to the Door

Biometrics have rapidly expanded into our daily lives, as millions of people use fingerprints to unlock their mobile phones, access cash through ATMs, and verify their identity in a growing range of use cases.



Gaining Customer Trust

Gaining Customer Trust

Recent years have confirmed that data breaches are here to stay. Breaches are growing both in intensity and frequency.

Protecting His House

Protecting His House

Criminals often view houses of worship as soft targets. The mission of these groups needn’t change but for the safety of clergy and congregants, leaders must commit to hardening their facilities against those that would do them harm.

Safe in Sound

While video surveillance often takes center stage in security deployments, equally as important is audio.

Using Mass Notification

Event venues and sporting complexes pose unique security and communication challenges. Numerous factors, including crowd size, whether the event is indoors or outdoors and what time of day the event is taking place all impact how a safety plan is developed.

A Word of Caution

A special word of caution needs to be emphasized when changing over to mobile systems. Many legacy access control systems require the use of backend portal accounts.

Changing the SIEM Game

For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.

Shielding the Attendees

Shielding the Attendees

By their very nature, terrorist attacks and errant drivers, who can also create untold damage, are unpredictable and predicated on surprise.

Ready Set Tackle

Being a TSA agent at Phoenix Sky Harbor International Airport doesn’t mean you have to understand the game of football or does it?

Advanced VMS and Analytics

The shipping industry is being tasked to improve productivity, increase speed of operations and mitigate risk from new and potentially devastating forms of attack from both external and internal potential threats.

Doyle Security Products provides Midwestern presence for ABLOY USA’s Distributor Network

The Minnesota locksmith wholesale company is the latest to join the ABLOY USA distributor network.

Thermal Imagers Deployed

Thermal Imagers Deployed

Dominion Nickel Alloys Ltd. operates on a global scale. Dominion specializes in the purchasing, sorting, processing, and marketing of a broad range of high temperature and specialty nickel-based alloys.

Plan Might Have a Weakness

Plan Might Have a Weakness

Cybersecurity and physical security no longer exist in two different worlds. Each now supports and depends on the other as part of a comprehensive risk and liability management program.

Encrypted USB Drives

The term “bad actor” once only referred to someone making a living in Tinsel Town. Now governments have used those words to describe rogue operators who carry out missions or perform actions with the intent to weaken or harm a country for the good of another.

Don’t Reinvent the Wheel

Don’t Reinvent the Wheel

As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a heavy reliance on the network.

capital one card

Capital One Breach Jeopardizes Data of Over 100 Million People

A lone attacker is accused of stealing personal information that included bank account numbers and Social Security numbers.

small plane flying

Department of Homeland Security Issues Cybersecurity Warning for Small Planes

Planes using networked communication systems are particularly vulnerable to cyberattacks, according to a flaw discovered by researchers.

siri app

Apple Contractors Regularly Overhear ‘Confidential’ Conversations Through Siri, Whistleblower Says

An employee spoke out due to their concerns about the potential misuse of information by firms working for Apple.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3