Top Stories


UK Issues Strict Security Guidelines for Connected Vehicles

UK Issues Strict Security Guidelines for Connected Vehicles

The UK, nervous about hackers gaining access to moving vehicles, has added strict guidelines to connected cars.

Four Ways Malware Sneaks on to Mobile Devices

Four Ways Malware Sneaks on to Mobile Devices

Fraudsters cast their nets wide in the hopes of snagging unaware and unsuspecting consumers who will unwittingly download malicious applications on to their mobile devices which can then be exploited for short or long-term financial gain by cybercriminals.

Secret Service to Test Drones for Additional Security

Secret Service to Test Drones for Additional Security

The Secret Service will be looking at whether unmanned aerial vehicles could be useful in the protection of the president.



Idesco Releases New Guide For Oversized ID Card Printers

Leading event management security provider offers Free Guide for Oversized ID Card Printers to Event Managers; helps improve security at large-scale events.

School Collapse in Minneapolis Leaves 3 Unaccounted For

School Collapse in Minneapolis Leaves 2 Dead

A gas leak at a Minneapolis schools has caused an explosion leaving 2 staff members dead.

What Businesses Need to Consider When Preparing for IoT

What Businesses Need to Consider When Preparing for IoT

Internet of Things (IoT) technologies are empowering consumers with products and services they simply couldn’t have imagined a few years ago.

Increased Security for Sydney Airport after Foiled Terrorist Plot

Increased Security for Sydney Airport after Foiled Terrorist Plot

Airport security in Australia is seeing an increase after police arrested an Islamist-inspired terror cell that was plotting to blow up an aircraft.

White House Officials Fooled by ‘Email Prankster’

White House Officials Fooled by ‘Email Prankster’

Can your employees spot a fake email?

Dahua Technology Announces Anixter International as New Distribution Partner

Video Surveillance Solutions from Dahua Now Available in 67 Anixter Store Locations throughout the US and Canada

Gearing Up for the Challenge

Gearing Up for the Challenge

While the goal of this campus was to provide a facility for athletes to compete, it was the family, friends and spectators who had a big impact on how it was designed.

Curbing the Violence

Curbing the Violence

Let me let you in on a troubling, not-so-little secret: violence in the workplace is continuing to escalate in medical facilities, despite the fact that national assault rates have been dropping in recent years.

The First Rule, Encrypt

It used to be that the most important aspect of implementing an electronic access control system was the simple control of who went where when. Today, the requirements of these sophisticated systems go beyond.

Implementing a Data-centric Approach

A company is much more complex than an IT department or a number of buildings. It is always evolving and adding more servers, buildings and systems, and therefore, obtaining more risk, costs and threats.

Metro Proof

The lock system of the Amsterdam underground is quite extensive and includes 2,574 cylinders. GVB was able to find and implement a system that solved their key issues as well as environmental issues.

We See You

We See You

The last major advancement in commercial perimeter security was the introduction of CCTV cameras.

On the Tip of their Toes

On the Tip of their Toes

No matter where any given city places a video surveillance camera, there are privacy concerns. There is, however, another side to the story.

Encryption to Cyber Bullying

The most pervasive cyber threat in the past 11 years has been ransomware infections. Who would have even known about something like this 30 years ago, but here we are trying with all diligence to protect folders and files, or even worse, the entire hard drive.

Featured

  • Creating More Versatility

    Today, AI has become top of mind for most security professionals. It is the topic of conversation in the technology world and continues to transform the way data is used to make important business decisions. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

  • Teaching AI New Tricks

    You have probably heard that AI-enabled security cameras are evolving the role of traditional surveillance cameras, shifting the focus from passive monitoring to active problem-solving and operational insights. AI technology changes fast, so what is new can be considered only news in just a few months. Read Now

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities