Top Stories


Airports Increase Security for 9/11 Anniversary

Airports Increase Security for 9/11 Anniversary

Florida officials are boosting security at and around airports for the anniversary of the Sept. 11 attacks.

How to Keep Safe in Cyberspace

How to Keep Safe in Cyberspace

Major threats around the world impend through the internet at alarming rates.

Integrate to Improve Loss Prevention

Integrate to Improve Loss Prevention

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All of these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country.



Future Smartphone Payments to Rely on Software Security

Future Smartphone Payments to Rely on Software Security

Study finds the growth of smartphone payments will increase the use of biometric security measures on mobile devices.

Four Dead, Two Injured in Cincinnati Shooting

Four Dead, Two Injured in Cincinnati Shooting

Three victims are dead and at least two more have been injured in an active shooter situation that took place in downtown Cincinnati this morning.

IT Spending to Increase in 2019 Due to Focus on Security

IT Spending to Increase in 2019 Due to Focus on Security

Businesses will be allocating more funds to their IT sector next year, with most of the budget going to cybersecurity measures.

Seven Indispensable Cybersecurity Tips

Seven Indispensable Cybersecurity Tips

Cybersecurity is something everyone should be concerned about. Every business must work to protect sensitive data and personal privacy. Here are seven indispensable cybersecurity tips for any and everyone on the internet.

Expanding Rural Infrastructure for Drones

Expanding Rural Infrastructure for Drones

Drones can provide significant benefits for residents and business in rural areas: delivering medical supplies, collecting data on the status of crops, aiding in search and rescue efforts.

Flying Under the Radar

Flying Under the Radar

With the high availability of today’s mobile network coverage and accessibility to public Wi-Fi hotspots, secure connectivity is often overlooked by traveling professionals.

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

The Age of Voice

The Age of Voice

We all are talking to machines these days. We talk to assistants in our home, in our cars and on our phones. By using our voice, we feel more engaged. We also become more productive, freeing our hands and minds for other tasks.

Tackling Parking Officer Abuse with Unified Evidence

Tackling Parking Officer Abuse with Unified Evidence

About two million people are affected by workplace violence every year in the United States. Some of these people are parking enforcement officers.

Processing Security

Processing Security

The surveillance technology initially installed at the site was triggered by outdoor motion sensors that activated any one of several PTZ cameras for verification—unfortunately this set-up generated far too many false alarms to be effective.

Just Say “Yes” to the Cloud

Just Say “Yes” to the Cloud

Cloud technology began with the concept of grid computing— the idea that we could replicate the way a power grid in a country was set up.

The Door is Open

The Door is Open

Technology innovations are being introduced to the market at an increasingly accelerated pace and the established multi-national companies that have long enjoyed strong market shares and growth rates are being challenged by hundreds of startups.

Bigger is Getting Better

Bigger is Getting Better

Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security.

Consider Data Security

Consider Data Security

Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.

Cyber and Security

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.

Featured

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.