Top Stories


Threat Intelligence From The Dark Web

Threat Intelligence From The Dark Web

The reputation of the “Dark Web” perhaps exceeds its reality

The 10 Best VPNs for Cryptocurrency Payment in 2018

The 10 Best VPNs for Cryptocurrency Payment in 2018

Make secure transactions with the best VPN service

Why a Cloud First Strategy Leaves the Door Open to Hackers

Why a Cloud First Strategy Leaves the Door Open to Hackers

Kicking off a cloud-first strategy without considering security measures can cloud your judgement



How AI Can Deliver a Safer Future

How AI Can Deliver a Safer Future

The ability of the latest developments in deep learning and neural networks to detect suspicious behaviour looks set to revolutionize security and law

CBP Turns Away Ukraine and Lithuanian Travelers at PIT Airport for Violating US Immigration Laws

CBP Turns Away Ukraine and Lithuanian Travelers at PIT Airport for Violating US Immigration Laws

CBP urges all international visitors to ensure they possess the appropriate U.S. travel visa for the purpose of their visit

DHS to Strengthened Northern Border Strategy

DHS to Strengthen Northern Border Strategy

The strategy establishes a clear vision and concrete actions that will improve DHS’s efforts to safeguard our northern border against terrorist and criminal threats

Homeland Security Launches Training For Countering Terrorists Exploitation of Social Media

Homeland Security Launches Training For Countering Terrorists Exploitation of Social Media

This online 90-minute training is designed to educate startup companies and social media companies about how terrorists may seek to exploit their platforms.

Police Are Training Canines to Sniff Out Electronics

Police Are Training Canines to Sniff Out Electronics

Strong nosed K-9s help police sniff out electronics.

Government Presents Federal Policy

Federal Policy, Technology Standards for Shaping Secure Identity and Access

The impact of updates to policy and specifications for the expanded use of standards-based technologies on securing identity and access in government was a leading theme throughout the two-day event.

Albuquerque Increasing Security at City Parks

Albuquerque Increasing Security at City Parks

The city council approved $114,000 for security cameras to be installed at the parks and an additional $100,000 for park security

University of Central Florida Modernizes IT Infrastructure

Campus Achieves Comprehensive Data Protection and Centralized Management for Entire Security and Surveillance Ecosystem with Pivot3 and Milestone Systems

Do You Know Where Your Data Is?

Do You Know Where Your Data Is?

Educational institutions are a data treasure trove.

Drones Using AI to Spot Violent Behavior in Crowds

Drones Using AI to Spot Violent Behavior in Crowds

Researchers are pairing artificial intelligence and drones in the latest experiment to prevent crimes before they happen.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.