Top Stories


Cut & Paste to Digitally Streamlined Credentials

Cut & Paste to Digitally Streamlined Credentials

Using a robust, web-based ID software to create credentials with high-security features for a community’s public employees

How VPN Help Organizations to Strengthen their Cybersecurity

How VPN Help Organizations to Strengthen Cybersecurity

A VPN creates an encrypted connection between your device and the remote private network.



Florida Healthcare System Launches New Security Protocols

Florida Healthcare System Launches New Security Protocols

Florida hospitals install new security protocols aimed at visitor management.

Phillies Build Security Perimeter Around Citizens Bank Park

Phillies Plan for Security Perimeter Around Citizens Bank Park

The Philadelphia Phillies are improving security around Citizen Bank Park with perimeter protection devices.

Upset Crypto Miners Spark Need for Security at Power Company in Washington State

Upset Crypto Miners Spark Need for Security at Power Company in Washington State

Utility companies in Washington State are boosting security after placing a moratorium on cryptocurrency miners.

Twitter Asks All Users to Change Their Password

Twitter Asks All Users to Change Their Password

A bug in the Twitter system caused people's passwords to be kept unmasked in an internal log.

A+ Technology & Security Solutions Expands Management Team; Appoints New VP of Sales & Marketing

Leading Long Island systems integrator continues growth pattern and expands sales and marketing team.

North Texas Teen Arrested for Planning ISIS-Inspired Attack

North Texas Teen Arrested for Planning ISIS-Inspired Attack

Officials said in an arrest affidavit that the suspect had talked online with an FBI source beginning in December 2017 and told the informant that he wanted to carry out a terrorist attack. He mentioned to the FBI source that he’d considered traveling to Pakistan and crossing the border into Afghanistan to join the Islamic State.

Cybersecurity Firm Researches Sonification of DDoS Attacks

Cybersecurity Firm Researches Sonification of DDoS Attacks

What if we could listen in on network traffic instead of just looking at it on graphs?

Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Security researchers found that certain models from Volkswagen could be hacked and remotely controlled.

Violent Incidents on UT Campus Leads to Improved Security

Violent Incidents on UT Campus Leads to Improved Security

The University of Texas has stepped up its safety and security following violent incidents on campus.

GSOCs And Artificial Intelligence Give Businesses A Predictive Edge In Identitying Threats

GSOCs And Artificial Intelligence Give Businesses A Predictive Edge In Identifying Threats

There are a lot of amazing things to say and write about Allied Universal. For starters, these security professionals are headlong into predictive analytics, and WOW, what a difference it makes in providing security services to the customer.

Adapting to Complex Demands

Adapting to Complex Demands

The true promise of the Internet of Things in the physical security space is that connected, network-enabled products will simplify both life and work, make companies more profitable, and provide better solutions than could be achieved through non-IoT products.

Leading the Way

With society facing new challenges, such as the changing nature of crime and pressure on police time, our cities are being forced to update their security responses to ensure they remain safe.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.