Top Stories


Multi-dimensional Applications

According to a number of studies, hospital crime and violence have been growing at an alarming rate in recent years. The wide variety of security threats that healthcare facilities face include theft by employees or visitors, violence or threats from visitors or patients, and other crimes of opportunity.

Taking Stock of Security

Throughout the course of a calendar year, we take a look at numerous security solutions, events and, in our case, publications. In this issue, we have a specialty publication that focuses on government security. Security in the public sector is a big deal.

Providing a Network Link

Providing a Network Link

Outdoor wireless bridges are used to provide a network link from one location to another. You may want to network surveillance cameras back to your main office building, or share Internet and network access with another building on your campus.



Engaging a Rapid Response

There is more than one reason why emergency vehicles have lights and sirens. Several years ago, there was a campaign by the Ohio state fire marshal which was, “Move right for lights and sirens.” This makes a lot of sense, allowing emergency response to get where they need to be with minimum interference.

The Next Big Step

The Next Big Step

Individuals have found that their phones and other smart devices can be used in their own homes to operate locks, and—along with the push for more IoT-enabled devices at work in general—they have come to expect the same level of sophistication and convenience at work.

Grow Your Business

Grow Your Business

Doing business with the government—federal, state or even local—can be very difficult. The regulations, the paperwork, the unique needs and buying cycles are all tough requirements that have to be met. It can make for a complicated scene, but it’s also a vitally important business that can be financially rewarding despite the challenges.

All the Hype

All the Hype

Alongside the hype in the media about the border wall, this might be a good time for commercial and industrial companies to take a closer look at their own borders. Threat levels are increasing due to rising crime, civil activism and even cyber threats and it is more important than ever to push the line of defense all the way to the borders.

Anti-ram Fencing

Vehicle ramming attacks are on the rise in the United States and abroad. Already in 2017, there have been no less than seven major attacks worldwide resulting in 24 people dead and another 153 injured.

Time for an Upgrade

Time for an Upgrade

When a regional traffic management center in Washington state outgrew its building—as well as the size of its roadway monitoring system— the staff realized it was time not just for a physical upgrade, but a technological one, too

Cannabis Cash - How do you secure your place in the weed business?

Cannabis Cash

Where is all the money in the marijuana business going? Who is moving the cash or product as it seems to be in the news all the time? Here we share why it’s important to your business that you know how this is all happening.

Using the Cloud

Using the Cloud

Today, cloud applications are all the rage and for good reason. The cloud allows us to work and play in ways that are so much more productive and engaging.

Minimize Crime

Minimize Crime

The city of Hartford, Conn., first began expanding and upgrading its surveillance capabilities in 2013 with a new Public Safety Complex and police headquarters. The city enlisted Vulcan Security Technologies to implement a new IP video system that could expand to include hundreds of cameras.

A Better Defensive Line

A Better Defensive Line

In the United States, technology has become the essential force multiplier. With nearly 6,000 miles of border with the neighboring north and south, it would be impossible to hire enough border personnel to protect every mile.

Bridging the Gap

The mobile ID revolution is gathering pace, but not everyone has a smartphone today, and many citizens prefer to carry a physical card. How do government agencies manage this transition from physical to mobile, and ensure they can issue both cards and mobile ID at the same time?

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

Credential Compromise: What You Need to Know About Theft, Stuffing and Spilling and What You Can Do About it

As new technologies emerge, ever-vigilant fraudsters remain hard at work searching for and exploiting system weaknesses before they can be patched.

Whole Foods Investigating Credit Card Security Breach

Whole Foods Investigating Credit Card Security Breach

The grocery chain has "recieved information reguarding unauthorized access of payment card information."

Technology Reaching Into the Cloud

For the past 14 years, Security Today magazine, Open Options and Axis Communications have hosted the annual Security Industry Party. This year, at the House of Blues. Open Options has been a great partner, and along the way, we have added new partners to help sponsor an event that brings people together after two days of hard work on the ASIS show floor.

Axis Communications Opens New Axis Experience Center in Texas During ASIS

Axis Communications Opens New Axis Experience Center in Texas During ASIS

Axis Communications announced the grand opening of their newest Axis Experience Center (AEC) in Irving, Texas.

Featured

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.