Top Stories


Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Vulnerabilities Could Give Hackers Remote Access to VW, Audi Models

Security researchers found that certain models from Volkswagen could be hacked and remotely controlled.

Violent Incidents on UT Campus Leads to Improved Security

Violent Incidents on UT Campus Leads to Improved Security

The University of Texas has stepped up its safety and security following violent incidents on campus.

GSOCs And Artificial Intelligence Give Businesses A Predictive Edge In Identitying Threats

GSOCs And Artificial Intelligence Give Businesses A Predictive Edge In Identifying Threats

There are a lot of amazing things to say and write about Allied Universal. For starters, these security professionals are headlong into predictive analytics, and WOW, what a difference it makes in providing security services to the customer.



Adapting to Complex Demands

Adapting to Complex Demands

The true promise of the Internet of Things in the physical security space is that connected, network-enabled products will simplify both life and work, make companies more profitable, and provide better solutions than could be achieved through non-IoT products.

Leading the Way

With society facing new challenges, such as the changing nature of crime and pressure on police time, our cities are being forced to update their security responses to ensure they remain safe.

Solid on the Ground

Solid on the Ground

Talk about intensity, Aeroturn engineers have found a new passion for developing turnstiles. In fact, they treat everything they do as if it is the only thing they do.

Creating an Effective Solution

Creating an Effective Solution

These days you hear a lot about the use of surveillance equipment is all avenues of life from banks to airports to your front porch, but a significant area that can often be overlooked is the agricultural, livestock and wildlife industry.

Intelligence Driven

Intelligence Driven

Whether you’re a government, corporate or nonprofit organization the enemy of security operation is surprise. Surprise causes losses: losses in revenue, losses in operational agility and even loss of life.

On The Job

The adoption of IP-based video surveillance cameras is driving the growth of the overall video surveillance market.

Automated Critical Security

Automated Critical Security

Thousands of people pour into and out of high-rise office buildings each day, and each must be kept safe and secure.

Safer Cities

Safer Cities

In Sinaloa, Mexico, the state’s government views enhancing public safety and security as priority number one. Sinaloa’s climate and terrain are perfect for supporting its booming agricultural and industrial economy, and this prosperity is dependent on effective law enforcement efforts that combat the influence of powerful drug cartels entrenched within the region.

Beyond the Basics

Beyond the Basics

A security camera is much more than a security camera when it’s part of an analytics infrastructure that serves completely new goals, advancing the organization and management of businesses and even entire cities.

Smartphone Popularity

Smartphones fulfill many needs, including telephone, camera, navigation, music, video, clock, news, calculator, email, internet, gaming, contacts, and more.

Security on a Grand Scale

When we talk about government security, the first thoughts are of the federal government. It is true that the federal government is bloated and somewhat mismanaged, but let’s talk about security on the grander scale; safe cities and even safer schools.

The Evolution of Intercom

The Evolution of Intercom

In 1970, intercoms were all about convenience. They made it easy for secretaries to communicate with their boss and for company employees to connect between offices within the same building.

The Problem Persists

The Problem Persists

While the security industry is being sold on UPS battery back-ups that come with “power conditioning” built in, the reality is that over 90 percent of these battery back-ups only offer surge suppression and surge suppressors that solely protect against large power fluctuations, such as lightning, which only account for two percent of failures.

A Good Endpoint

Most of the malicious or criminal activity targeting today’s enterprises involves the endpoint. Insecure endpoints are an expensive risk and difficult to address.

Forensic Analysis and Security

Forensic Analysis and Security

Connected or smart devices in or on buildings, vehicles, and even people include software, mobile apps, sensors, and network connectivity used to collect and exchange data.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.