Top Stories


Belgium Transit Minister Resigns after Airport Security Lapses

Belgium Transit Minister Resigns after Airport Security Lapses

Belgian Transit Minister, Jacqueline Galant, resigned after it was leaked that she ignored found security lapses in the Brussels airport.

ComNet Introduces Enhanced Security Managed Switch for Use in Demanding Cyber Security Applications

New RLGE2FE16R designed to prevent unauthorized network access.

Microsoft Suing Government for Secret Searches

Microsoft Suing Government for Secret Searches

Microsoft filed a lawsuit against the U.S. Department of Justice taking a stand against the way federal agents routinely search its customers’ personal information in secret.



California Police Prepare Security Plan for Coachella

California Police Prepare Security Plan for Coachella

Coachella, a music festival in Indio, California, will be seeing an increase in security measures due to recent world events.

King County Chooses C•CURE 9000 for Comprehensive, Integrated Security

Washington State’s most populous county integrates emergency notification, video surveillance and access control systems with single-user interface solution.

Businesses Need Education on Cloud Security

Businesses Need Education on Cloud Security

Based on research done by Intel Security, there is a c-level blind spot when it comes to the vulnerabilities of the cloud.

Cleveland Prepares for Riots at Republican Convention

Cleveland Prepares for Riots at Republican Convention

Cleveland is spending $20 million in federal money on riot and security gear for the Republican Convention.

CBS Sports App Left User Data Vulnerable During March Madness

CBS Sports App Left User Data Vulnerable During March Madness

Fans of the college basketball tournament, March Madness, may need to pay special attention to the information they shared on the CBS Sports app and website during the popular event.

ISC West 2016 Product Showcase

ISC West 2016 Product Showcase

Until Next Year ISC West

When I attend ISC West next year, I’ll be better prepared.

Trends of ISC West 2016

Trends of ISC West 2016

This year at ISC West in Las Vegas, there were some definite trends to be seen in the security industry.

Live from the Final Day of ISC West 2016

The last day of ISC West saw some unexpected and innovative products

Chicago PD to Arm More Officers with Body Cameras

Chicago PD to Arm More Officers with Body Cameras

The Chicago Police Department will be arming officers in gang-plagued areas with body cameras that will continuously record

Hitting a Homerun

Spending three days in Las Vegas at ISC West, anyone attending had to get the feeling that the security industry is alive and well. There was synergy.

High Resolution, Data Storage, Easy to Use/Install – It's All Here at ISC West

Walking through the many, many aisle of company booths, showing their newest and most innovative products, it's hard not to stop and check out the latest offerings that every single company has to offer.

Superior Biometrics at ISC West

Biometrics has always been a hot topic in the Security Industry, but nowadays it seems like those faraway dreams of using fingerprint, facial and iris identification are here. During ISC West, I got the chance to sit down with Yaron Zussman, CEO of FST Biometrics, to discuss some of the latest they have to offer in the competitive world of biometrics.

Hospital Security Increased After Psych Patients Escape

Hospital Security Increased After Psych Patients Escape

Security will be increased at a Washington state psychiatric hospital after two dangerous patients escaped.

UT Students Call for Increase in Security after Murder on Campus

UT Students Call for Increase in Security after Murder on Campus

The University of Texas’ student population is petitioning for more campus security following the murder of a freshman on campus.

Connected Security at ISC West

During ISC West, visitors can also attend the Connected Security Expo, a new conference-led event that focuses on holistic security and aims to bridge the gap between IT Security and Physical Security for IOT. The expo helps attendees better understand information security and physical security can – and should be – used together to combat existing, new and upcoming cyber threats

Farewell to ISC West

Time seems to go a lot faster in Vegas. There's so much to do and see, that it's impossible to accomplish everything on your to-do list while you're there. I got to spend two day at ISC West, and I gotta say that I cannot wait to go again next year. The conference is spectacular, and the energy there is nothing short of electric

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3