Top Stories


How to Weed the Bad Links Out of Your Inboxes

How to Weed the Bad Links Out of Your Inboxes

Entities need to understand why these attacks are so common and how to combat them.

TSA Chief Says Agency Must Adapt to Changing Security Threats

TSA Chief Says Agency Must Adapt to Changing Security Threats

The Transportation Security Administration must shift their focus away from checkpoints and toward public, less-strictly secured areas of airports in order to adapt to changing threats, according to the agency’s new chief.

One Dead, One Injured in "Accidental" School Shooting

One student was killed and a second was injured Wednesday afternoon in what was called an accidental shooting at Huffman High School in Birmingham, Alabama, authorities said.



BlackBerry Licensing Security Software

BlackBerry Licensing Security Software

The new licensing program is called BlackBerry Secure and aims to protect devices with BlackBerry security technology.

A Digital Defense Against W-2 Theft

A Digital Defense Against W-2 Theft

The FBI gives basic steps to mitigate the threat of W-2 theft.

Tennessee Adopts New Security Standards for Courthouses

Tennessee Adopts New Security Standards for Courthouses

For the first time in two decades, Tennessee is boosting security standards for courthouses across the state.

GDPR: Here

GDPR: Here's What You Need to Know

The European Union will begin to enforce strict data security starting in May. Here's what you should know.

SIA Names James Marcella of Axis Communications as SIA Committee Chair of the Year

SIA Names James Marcella of Axis Communications as SIA Committee Chair of the Year

With this award, SIA honors Marcella for his work in strengthening education programming for the security industry through SIA Education.

Varonis Introduces Support for Hewlett Packard Enterprise 3PAR StoreServ Storage for File Access and Auditing

Proactive data monitoring plays a critical role in securing sensitive business information.

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity was found to be the top technology used by healthcare facilities.

LTE Vulnerability Could Allow Hacker to Send Fake Emergency Alerts

LTE Vulnerability Could Allow Hacker to Send Fake Emergency Alerts

One of the ten attacks can create "artificial choas" by sending a fake emergency alert to cell phone users.

Users Provide Stronger Passwords If They Can Visualize Password Strength

Users Provide Stronger Passwords If They Can Visualize Password Strength

A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.

Two Dead Following Shooting at Central Michigan State Residence Hall

Two Dead Following Shooting at Central Michigan State Residence Hall

The suspected shooter is still at large, and is considered to be armed and dangerous.

Securitas Agrees to Acquire Kratos Public Safety and Security Division

Securitas has agreed to acquire the division Kratos Public Safety and Security from Kratos Defense & Security Solutions, Inc. The purchase price is approximately MSEK 550 (MUSD 69) on a cash and debt-free basis. The acquisition is expected to be neutral to Securitas earnings per share in 2018 and 2019, and accretive as of 2020.

What’s Next?

The growth of technology is everywhere. What’s next for the security industry? I think the next innovation poised to transform the security industry will be deep learning or artificial intelligence (AI), which is a system that learns by looking at masses of data.

Poised for Expansion

Poised for Expansion

Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.

Going All Out

Going All Out

When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.

Security on a High Note

Security on a High Note

The safety and security of visitors and staff and the protection of the Musical Instrument Museum's extensive collection is an essential aspect of fulfilling its mission. With an active facility during both day and evening hours, the museum sought to upgrade its outdoor security surveillance system to improve the quality of the images around the clock.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.