Top Stories


Integrators are Product Savvy

It has become crystal clear to me that integrators and distributors are experts in product development in this industry.

On the Run

The modern workplace is increasingly mobile. The prevalence of secure mobile internet and emphasis on face-to-face collaboration has seen corporations increasingly emphasize remote work for their employees.

Arkansas PAnel Calls for Armed Presence at All Schools

Arkansas Panel Calls for Armed Presence at All Schools

Arkansas looks for ways to boost security on campuses.



21 Million Users Affected by Timehop Data Breach

21 Million Users Affected by Timehop Data Breach

Timehop disclosed a security breach that has compromised the personal data, including names and emails, of its 21 million users

Catholic Diocese of Fort Worth Shifts Focus to Security

Catholic Diocese of Fort Worth Shifts Focus to Security

Catholic churches in Fort Worth have removed signs banning guns, but that doesn't mean the policy has changed.

Smithsonian to Add Permanent Security Checkpoints at National Zoo

Smithsonian to Add Permanent Security Checkpoints at National Zoo

The National Zoo is the only Smithsonian public venue without security screening.

The Case for Deploying H.265 in Video Surveillance

The Case for Deploying H.265 in Video Surveillance

As the security industry continues to embrace 4K, Ultra HD and other high-resolution imaging formats with high bitrates, recording and storing surveillance video has become one of the main challenges facing end users and systems integrators.

How Your Organization Can Get Started with Information Security

How Your Organization Can Get Started with Information Security

Information Security it is one of the most in demand skill sets in all the technology industry.

San Diego International Airport Deploys Facial Recognition

San Diego International Airport Deploys Facial Recognition

An airport in San Diego is utilizing facial recognition to speed up the screening of passengers.

FBI Foiled Planned Fouth of July Attack in Cleveland

FBI Foiled Planned Fourth of July Attack in Cleveland

The suspect was arrested over the weekend for "attempted material support of a foreign terrorist organization."

Google Duplex: What are the Security Implications?

Google Duplex: What are the Security Implications?

This new AI could present new challenges as well as opportunities

Four Dead in Capital Gazette Newsroom Shooting, Suspect in Custody

Five Dead in Capital Gazette Newsroom Shooting, Suspect in Custody

Five people have been killed in a shooting at a local newspaper building in Maryland.

AI, Racial Profiling Put Credibility at Risk

AI, Racial Profiling Put Credibility at Risk

A news report states Hikvision has covered up evidence of racial profiling and Artificial Intelligence errors

How Tech Can Bolster School Security and Help Prevent the Next School Shooting

How Tech Can Bolster School Security and Help Prevent the Next School Shooting

There is no single approach or solution that can help protect schools.

James Henderson Wins Canada’s Top 40 Under 40® Award

Avigilon’s President and Chief Operating Officer honoured with prestigious national leadership award

Wi-Fi Security Sees Toughest Upgreat in a Decade

Wi-Fi Security Sees Toughest Upgrade in a Decade

\Wi-Fi Alliance is looking to beef up security with an updated protocol

New Orleans Real-Time Crime Center Relies on BriefCam Video Content Analytics Platform to Improve Public Safety

BriefCam Helps City of New Orleans Solve Crime, Investigate Security Incidents and Proactively Improve Crowd Control and Public Event Safety in More Than 100 Cases

Pittsburgh Adding Security Layers to PNC Field

Pittsburgh Adding Security Layers to PNC Field

Metal detectors are being added to entrances at PNC Field

Google Gives Users Better Access to Privacy & Security Settings

Google Gives Users Better Access to Privacy & Security Settings

Google has announced it has overhauled it's privacy and security settings service

Baseline Hardening The Best Defense Against Advanced Persistent Threats

Baseline Hardening: The Best Defense Against Advanced Persistent Threats

What business should do to protect against APTs

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3