Top Stories


London Underground Train Blast Being Treated as Terrorism

London Underground Train Blast Being Treated as Terrorism

An "improvised explosive device" was detonated on a Tube in south-west London.

U.S. Blacklists Kaspersky Software in Federal Agencies

U.S. Blacklists Kaspersky Software in Federal Agencies

The US government has officially banned the use of Kaspersky security software in all of its federal agencies.

School Shooting South of Spokane Kills One Injures Three

School Shooting South of Spokane Kills One, Injures Three

One teenage student has died and three others were injured during a school shooting south of Spokane, Washington on Wednesday, Sept. 14.



Bluetooth Security Flaw Puts Billions at Risk

Bluetooth Security Flaws Puts Billions at Risk

A set of vulnerabilities present in "almost every" device with Bluetooth capabilities has been revealed by researchers at security firm Armis.

No Security Threat for Winter Olympics in South Korea

No Security Threat for Winter Olympics in South Korea

The International Olympic Committee has said there is "no hint" of a security threat for next year's Pyeongchang 2018 winter Olympics in South Korea.

Salt Lake Security Guards Injured After Scuffle

Salt Lake Security Guards Injured After Scuffle

Two Salt Lake City security guards were stabbed early Sunday in a scuffle with customers at a downtown night club, police said.

How Apples New iOS Could Give You Better Data Security

How Apple's New iOS Could Give You Better Data Security

The iOS 11 has been in beta testing for a few weeks now and many users are reporting a new discovered security feature that could boost a user's data security and make it harder for police to find information.

New York Police Department Communication System Hacked

New York Police Department Communication System Hacked

A recent incident in upstate New York has shown that even police departments aren't immune from hacking.

How Cellular Technology is Transforming Home Security and Alarm Panels

How Cellular Technology is Transforming Home Security and Alarm Panels

As traditional phone lines have declined in recent years, many of these new ecosystems are now being directly supported by cellular and IP networks that avoid publicly switched telephone network (PSTN) infrastructure.

Winter GDPR is Coming

Winter (GDPR) is Coming

You might have heard – winter is coming. And just like winter in Game of Thrones, GDPR is coming.

Equifax Cyberattack to Affect 143 Million Customers

Equifax Cyberattack to Affect 143 Million Customers

The Atlanta-based company announced the hack on Thursday, and said that intruders were able to access customers' Social Security numbers, addresses, names, birthdays, driver’s license numbers and more.

What Happens When Your Employees

What Happens When Your Employees' Equipment Is Left Unattended?

The Importance of Locking Down Multiple Devices in the Office

Security Industry Rallies to Help Harvey Victims

Security Industry Rallies to Help Harvey Victims

Manufacturer Rep Firm LRG inc and their vendor partners have started a pledge drive to directly assist electronic security personnel and their families that were severely affected by Hurricane Harvey.

SDC Launches $2,500 Door Package Giveaway

SDC has added a new, labor-saving function called DoorSnap to its free, award-winning SDCSecurity App.

Vegas Airport to Upgrade Security Features

Vegas Airport to Upgrade Security Features

A new, innovative screening process was unveiled, and the Transportation Security Administration, with the help of Clark County, just proposed a grant of more than $10 million for other security upgrades.

Private Security Outnumber Police Around the World

Private Security Outnumber Police Around the World

In at least half of the world’s countries, private security workers outnumber police officers. More than 40 countries, including the United States and the United Kingdom, have more guards privately hired to protect certain people, places and things than police officers whose duty it is to protect the public.

Vicon Expands A&E Services Team

Vicon announced the expansion of its A&E Services division, with the addition of David Busco, who will manage Vicon’s relationships with the A&E community throughout the eastern United States.

Join Mission 500 for the Security Softball Game

Help Mission 500 reach their fundraising goal of $75,000 at the third annual Security Softball Game.

3VR Hires Security Veteran Douglas Florence as Western Sales Director

Florence brings deep experience in security, surveillance, business continuity planning, and investigation operations in gaming, retail, and corporate security.

Vulnerabilities Revealed in AT&T Modems

Vulnerabilities Revealed in AT&T Modems

Gaping security holes have been discovered in most AT&T U-verse cable modems that would allow remote cyber criminals to access a household’s internet connection as well as any devices connected to it.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3