Top Stories


One Dead, One Injured in "Accidental" School Shooting

One student was killed and a second was injured Wednesday afternoon in what was called an accidental shooting at Huffman High School in Birmingham, Alabama, authorities said.

BlackBerry Licensing Security Software

BlackBerry Licensing Security Software

The new licensing program is called BlackBerry Secure and aims to protect devices with BlackBerry security technology.

A Digital Defense Against W-2 Theft

A Digital Defense Against W-2 Theft

The FBI gives basic steps to mitigate the threat of W-2 theft.



Tennessee Adopts New Security Standards for Courthouses

Tennessee Adopts New Security Standards for Courthouses

For the first time in two decades, Tennessee is boosting security standards for courthouses across the state.

GDPR: Here

GDPR: Here's What You Need to Know

The European Union will begin to enforce strict data security starting in May. Here's what you should know.

SIA Names James Marcella of Axis Communications as SIA Committee Chair of the Year

SIA Names James Marcella of Axis Communications as SIA Committee Chair of the Year

With this award, SIA honors Marcella for his work in strengthening education programming for the security industry through SIA Education.

Varonis Introduces Support for Hewlett Packard Enterprise 3PAR StoreServ Storage for File Access and Auditing

Proactive data monitoring plays a critical role in securing sensitive business information.

LTE Vulnerability Could Allow Hacker to Send Fake Emergency Alerts

LTE Vulnerability Could Allow Hacker to Send Fake Emergency Alerts

One of the ten attacks can create "artificial choas" by sending a fake emergency alert to cell phone users.

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity Tops List of Technologies Employed by Healthcare Facilities

Cybersecurity was found to be the top technology used by healthcare facilities.

Users Provide Stronger Passwords If They Can Visualize Password Strength

Users Provide Stronger Passwords If They Can Visualize Password Strength

A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.

Two Dead Following Shooting at Central Michigan State Residence Hall

Two Dead Following Shooting at Central Michigan State Residence Hall

The suspected shooter is still at large, and is considered to be armed and dangerous.

Securitas Agrees to Acquire Kratos Public Safety and Security Division

Securitas has agreed to acquire the division Kratos Public Safety and Security from Kratos Defense & Security Solutions, Inc. The purchase price is approximately MSEK 550 (MUSD 69) on a cash and debt-free basis. The acquisition is expected to be neutral to Securitas earnings per share in 2018 and 2019, and accretive as of 2020.

What’s Next?

The growth of technology is everywhere. What’s next for the security industry? I think the next innovation poised to transform the security industry will be deep learning or artificial intelligence (AI), which is a system that learns by looking at masses of data.

Poised for Expansion

Poised for Expansion

Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon.

Going All Out

Going All Out

When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another.

Eliminating Fraud

The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses.

Security on a High Note

Security on a High Note

The safety and security of visitors and staff and the protection of the Musical Instrument Museum's extensive collection is an essential aspect of fulfilling its mission. With an active facility during both day and evening hours, the museum sought to upgrade its outdoor security surveillance system to improve the quality of the images around the clock.

The New Age

The New Age

Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.