Top Stories


The Top 10 Application Security Vulnerabilities of 2018

The Top 10 Application Security Vulnerabilities of 2018

What do British Airways, Ticketmaster, the USPS and TaskRabbit all have in common?

Tackling the Challenges

It should come as no surprise that cybercrime is one of the biggest threats organizations of all shapes and sizes face today.

Millions of Fortnite User Accounts Made Vulnerable

Millions of Fortnite User Accounts Made Vulnerable

Epic Games, the company behind the wildly popular video game, Fortnite, acknowledged that a vulnerability had risked users' account information.



New Power and Transmission Solutions from Altronix

Altronix is showcasing the latest power and data transmission solutions designed for professional security applications at Intersec 2019. Featured products include an enhanced line of NetWay™ Midspan/Injectors, NetWay™ Spectrum Hardened Switches and its expanded Trove™ Access and Power Integration products available in wall mount, rackmount and outdoor configurations.

No-Show TSA Agents Increase, Screening Checkpoints Closed

No-Show TSA Agents Increase, Screening Checkpoints Closed

As the government shutdown inches into its fourth week, more TSA agents than ever are calling in sick to work with no sign of a future paycheck.

Stop the Bleed Campaign Proves to be Working Following Shooting in Utah

Stop the Bleed Campaign Proves to be Working Following Shooting in Utah

Victims in a Utah mall shooting arrived at the hospital with tourniquets, a life-saving measure frequently taught in Stop the Bleed courses.

The Next Wave

Originally designed as consumer devices, smartphones have become vital elements of both our personal and professional lives.

CyberLock Celebrates 20th Anniversary

2019 marks historic milestone for pioneer in smart key systems

Ransomware Attack Closes Down Texas Town

Ransomware Attack Closes Down Texas Town

The City of Del Rio was forced to return to pen and paper when a ransomeware attack rendered City Hall useless.

Atlanta Passenger Got Through TSA, Boarded Plane with Loaded Gun

Atlanta Passenger Got Through TSA, Boarded Plane with Loaded Gun

A woman was allowed on a plane headed to Japan with a pistol and ammunition earlier this month.

NASA to Boost Data Security with Blockchain Technology

NASA to Boost Data Security with Blockchain Technology

NASA plans to advance its technology security by adding blockchain.

The U.S. Government is on Hiatus, Cybersecurity Threats Are Not

The U.S. Government is on Hiatus, Cybersecurity Threats Are Not

Guy Franklin of SOSA discusses the lasting effects of the government shutdown.

Investigation: Ring Employees Allegedly Accessed Users

Investigation: Ring Employees Allegedly Accessed Users' Security Camera Footage

An investigation published by The Intercept found that some Ring employees were giving access to users' security camera feeds.

Cedar Falls Increasing Safety Measures in Nightlife Area Following Recent Shooting

Cedar Falls Increasing Safety Measures in Nightlife Area Following Recent Shooting

Cedar Falls, Iowa, plans to increase security in a popular nightlife area after a recent shooting.

Indiana Synagogue Increases Security, Prepares for the Worst

Indiana Synagogue Increases Security, Prepares for the Worst

The Congregation at Indiana's Shaarey Tefilla Synagogue partners with Indiana State Police to train for an active shooter.

Government Shutdown: TSA Union Warns of "Massive Security Risk"

Government Shutdown: TSA Union Warns of "Massive Security Risk"

TSA agents are calling in sick for work, and even quitting altogether, following days of unpaid work due to government shutdown.

North Carolina Library Defends Decision to Install Cameras in Bathrooms

North Carolina Library Defends Decision to Install Cameras in Bathroom

Rocky Mount Library says the cameras in the bathroom are a matter of security.

ADT Continues Commercial Expansion through Purchase of Advanced Cabling Systems

Addition in the Mid-South Follows Recent Red Hawk Fire & Security Acquisition, Further Strengthening Commercial and National Accounts Segments

Featured

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

  • Gun Violence Report Finds Retail Spaces, K-12 Schools Most Targeted

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, today announced the release of its annual Gun Violence Report, offering a deep dive into the landscape of gun-related incidents across the United States. This analysis extends beyond mass fatality events, providing a more nuanced understanding of when, where, and why shootings occur. Read Now

  • Agentic AI Will Revolutionize Cybercrime in 2025 According to New Report

    Malwarebytes, a provider in real-time cyber protection, recently released its 2025 State of Malware report, which reveals insight into the emergence of agentic artificial intelligence (AI), plus the year’s most prominent threats and cybercrime tactics. The report details a significant uptick in the number of known ransomware attacks, the total value of ransoms paid in 2024, and how IT teams can address them. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.