Top Stories


A Breakdown of the Nation’s Unsecured Security Cameras

A Breakdown of the Nation's Unsecured Security Cameras

A security firm analyzed open security cameras and concluded which U.S. cities have the most unsecured cameras in use.

Airport Security Could Suffer from Brexit

Airport Security Could Suffer from Brexit

If Britain decides to leave the European Union, British airports may see a slump in security.

Louroe Electronics Showcases Live Gunshot Detection Demonstration

Louroe Electronics Showcases Live Gunshot Detection Demonstration

Schools, law enforcement and other institutions to experience first-hand the benefits and ease-of-use of cutting-edge audio analytics technology.



Security in Rio Questioned After Olympian Mugged

Security in Rio Questioned After Olympian Mugged

Australian Olympian, Liesl Tesch, was mugged outside the athlete accommodations in Rio.

Alternative Fire Alarm Reporting Communications Solutions for New & Old Systems:  Offer Monthly Savings & Meet New NFPA 72 Code

Alternative Fire Alarm Reporting Communications Solutions for New & Old Systems: Offer Monthly Savings & Meet New NFPA 72 Code

Under the latest 2016 edition requirements for Fire System Monitoring has changed drastically. The three options to keep current for fire system monitoring are two telephone lines requiring special, site specific AHJ approval; a single phone line plus another independent form of communications, or a Sole Path Fire Communicator or Equivalent.

FBI Release Timeline and Transcript of 911 Calls from Pulse Nightclub Shooting

FBI Release Timeline and Transcript of 911 Calls from Pulse Nightclub Shooting

Orlando Police and FBI released information about the sequence of events during the shooting that killed 49 and injured 53 more.

Thousands of Credit Cards Stolen from Acer Online Store

Thousands of Credit Cards Stolen from Acer Online Store

Acer has admitted to a data breach that affects more than 30,000 customers.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

Security Products Dad Will Love

Security Products Dad Will Love

Father’s Day is just around the corner; give Dad the gift of security with one of these products.

Plastic Surgeon Selects IDIS for Enhanced Security

Next-Generation IDIS Solution ensures robust safety and security environment for both patients and staff.

British Politician Dies after Attack in Birstall

British Politician Dies after Attack in Birstall

British Politician Jo Cox was attacked on June 16 in Birstall. She later died of her injuries.

NFL Hires Cybersecurity Firm after Social Media Hacks

NFL Hires Cybersecurity Firm after Social Media Hacks

The NFL has hired cybersecurity firm, K2 Intelligence, to help teach players how to use social media.

Mark Cuban to Donate $1 Million for Dallas Police Response to Orlando Shooting

Mark Cuban to Donate $1 Million for Dallas Police Response to Orlando Shooting

Dallas Mayor Mike Rawlings announced Mark Cuban will donate $1 million to the Dallas PD to help enhance counterterrorism efforts.

Toddler Attacked by Alligator at Disney’s Grand Floridian

Toddler Attacked by Alligator at Disney's Grand Floridian

The search continues for the 2-year-old that was dragged into a lagoon near Disney’s Grand Floridian.

IDIS Highlights Retail Video Surveillance Solutions in NRF PROTECT Loss Prevention Expo Debut

At NRF PROTECT 2016, IDIS will demonstrate its total surveillance solution for the retail marketplace, featuring its powerful 5MP 360° Super Fisheye Camera, intuitive Smart UX camera controls, and new video analytics offerings.

STANLEY Security Recognized by CivilianJobs.com as Winner of 2016 MVE for Military

STANLEY Security has been recognized by CivilianJobs.com, connecting America’s military personnel with civilian careers, as a Most Valuable Employer (MVE) for Military.

VidCon Increases Security in Wake of Florida Shootings

VidCon Increases Security in Wake of Florida Shootings

Officials of VidCon, a conference that brings Social Network stars and their fans together, will see increased security in the wake of the shootings in Florida.

Quantum Secure Promotes Don Campbell to Vice President of Product

Experienced Executive to Continue to Drive Growth and Momentum of Company’s Industry-Leading PIAM Solution.

UCLA Forms Task Force after Deadly Shooting on Campus

UCLA Forms Task Force after Deadly Shooting on Campus

In the week following the murder-suicide that happened on UCLA’s campus, safety officials have created a task force to deal with security issues.

Arming Campus Security: Is it a Good Idea?

Arming Campus Security: Is it a Good Idea?

In the wake of mass shootings, many schools are asking themselves this question.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3