Top Stories


Validate Your Security Model

Validate Your Security Model

As security threats grow in complexity and scale, organizations are spending major resources to address the threats and minimize risk, including hiring top security talent and purchasing sevenfigure security solutions.

Common Mistakes

As the cyber threat landscape has matured and evolved, cybersecurity incidents have become a regular occurrence.

Ohio County Taps Startups for Automation

Officials in Cuyahoga County, Ohio are looking to digitize and automate paper-based processes at several agencies through a program that encourages governments, startups and small businesses to collaborate on solutions.



Implementing Commercial Security

Commercial buildings face a universal challenge: how to manage security without encroaching on tenant privacy, comfort and experience.

Policy Bill Includes Cyber Investments

Data on OTAs and prototypes. The House proposed an annual reporting requirement on how the Defense Department is using OTAs.

All About the Data

All About the Data

When you consider today’s smartphones, the phone part is almost ancillary. It’s really the apps and the advanced optics that drive the purchase.

Surviving The Tough Times

Dayton, Ohio, has seen a lot of ups and downs over the years. The city is more than a survivor as businesses find a way to keep their doors open, and today, even attract some very interesting tech firms.

It Takes a Village

It Takes a Village

As the city began strategically deploying surveillance cameras throughout Atlanta, APF invested $350,000 to create the cuttingedge Loudermilk Operation Shield Video Integration Center (VIC).

This is Big Business

This is Big Business

When it comes to government contracting, security spending is big business—and small business too.

Transforming the Industry

Transforming the Industry

Artificial Intelligence (AI) continues to gain momentum every day, and it is already poised to augment and enrich many aspects of our business and personal lives.

Essential Management

Essential Management

There are essential elements that great integrators and managed service providers have that set them apart from the competition.

Airport IoT Operations

The Internet of Things (IoT) has landed in airport operations. More than 20 billion end devices are already networked via the Internet, and there will likely be three times more than this by 2025, according to Statista.

Transforming Healthcare Security

Transforming Healthcare Security

Security is a top priority at healthcare facilities across the country, but developing and deploying an effective healthcare security strategy is a challenging process.

Defining Performance Criteria

Defining Performance Criteria

There are good reasons that video surveillance is mandated for any casino operation by both federal and state gaming authorities – it has proven to be an effective tool to help ensure safety,

Reconsidering Used Equipment

Reconsidering Used Equipment

Once you have made the decision to install a security entrance, you may find that your search for a provider brings you to used turnstiles, revolving doors or portals for sale. Naturally, these tend to be cheaper than new products.

cyber command center

Documents Reveal Why U.S. Military Publishes Malware Used by North Korean and Russian Hackers

CYBERCOM has created a Twitter account with thousands of followers to publicize malware samples it shares with cybersecurity companies. Internal documents explain that it’s part of a defensive (and offensive) strategy.

miller brewery

Employee Who Frequently Argued With Colleagues Kills Five At Milwaukee’s Miller Brewery

The gunman, who took his own life after shooting and killing five others, had frequent conflicts with his coworkers.

capitol hill building

Lawmakers Plan Bill That Would Endanger Tech Company Efforts to Implement Full Encryption

The legislation reflects growing frustration from the Justice Department about the encryption practices of tech companies, particularly when it comes to investigating child abuse or terrorist activity.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities