Top Stories


Facebook Accused of Misusing the Phone Numbers

Facebook Accused of Misusing Phone Numbers

Facebook users have found that a phone number they added to their account for the sole purpose of two-factor authentication can be used to look up their account by advertisers and strangers.

Phillies to Install Security Bollards at Citizens Park Bank

Phillies to Install Security Bollards at Citizens Park Bank

Phillies security director Sal DeAngelis said that two years ago, the team took notice of the way terrorists were using vehicles in their attacks. They realized that they needed to update the park’s security in response.

IBM Finds Security Flaws in Visitor Check-In Systems

IBM Finds Security Flaws in Visitor Check-In Systems

“We found that you could break out of the kiosk and interact with the underlying Windows operating systems, and from there do things like drop malware or open up the database,” said Daniel Crowder, research director at the IBM X-Force Red security unit.



Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

Tips for Conducting a Personal Online Security Audit to Protect Yourself from Threats This Year

What can you do to protect your personal data in 2019?

Louisiana Prison to Undergo $1 Million Security Upgrade

Louisiana Prison to Undergo $1 Million Security Upgrade

Bossier, La. maximum-security prison to undergo sweeping security upgrades

How to Offer Mobile Convenience While Keeping Health Data Secure

How to Offer Mobile Convenience While Keeping Health Data Secure

The solution isn’t to be afraid of mobile in healthcare

TikTok Hit with Record Setting Fine for Collecting Data of Children

TikTok Hit with Record Setting Fine for Collecting Data of Children

TikTok, a popular video-sharing app, has agreed to pay $5.7 million to settle allegations that it collected data on children.

More Than Just Security

As technology has advanced, security has branched out beyond simple surveillance and intruder deterrence.

Leveraging Thermal Against Threats

Leveraging Thermal Against Threats

Artificial intelligence continues to redefine the capabilities of physical security systems and shape customer demands.

Selecting the Right Access Control System

Selecting the Right Access Control System

With a password on each computer and a cardbased access control system on the door, many businesses feel they have their bases covered when it comes to both logical and physical security.

Six Trends, Predictions and Emerging Technologies Ahead of ISC West 2019

Six Trends, Predictions and Emerging Technologies Ahead of ISC West 2019

The following predictions for ISC West 2019 dive deeper into how these innovations, among others, will help move the security industry forward.

Secure Storage in the Age of Edge Computing and the Cloud

Secure Storage in the Age of Edge Computing and the Cloud

Back when IT was dominated by on-premises data centers, storage options were fairly straightforward and securing storage resources was relatively simple compared with today’s far more complex storage landscape.

A Secure Healthcare Prescription

A Secure Healthcare Prescription

Hospitals and other healthcare facilities face unique security and surveillance challenges.

The Uberization of Security’s Business Model

The Uberization of Security’s Business Model

Companies large and small are now actively seeking a fresh approach to optimizing their physical and logical security operations and managing their risk, while capping or reducing their total cost of ownership (TCO).

Automating Critical Environments

Automating Critical Environments

As key stakeholders look to implement AI into their workflow, many find that security and safety is a commonsense place to begin.

Continued Integrity

Continued Integrity

For the County of Travis in Austin, Texas, research, dedication and the right team resulted in the perfect integrated security solution for its sprawling campus and multi-location facilities.

Creating User-Centric Citizen Identity Programs

Creating User-Centric Citizen Identity Programs

Governments are implementing innovative programs that are revolutionizing how the world looks at identity and citizenship.

Looking Beyond the Hype

Looking Beyond the Hype

The past few years have seen significant advancements in computing power. With this, machines seem to have a greater ability to learn about us and participate in our lives.

Protecting Mining and Quarry Operations

Protecting Mining and Quarry Operations

Natural resources being extracted at a mining or quarry operation not only have monetary value, but may also be critical components of medical, military, and industrial processes.

Featured

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3