Top Stories


All Too Common

All Too Common

On Dec.19, 2016, the news exploded with information about a vehicle attack on a Christmas market in Berlin that killed at least 12 people and injured over 50 more.

Using Social Media

Thirty-seven percent of people in the United States bought one or more smart devices in 2015, and many of the people in this large consumer market are tech savvy – so how do you tap into them? Having a broad online presence with positive messaging can help take your business to the next level. But, you may ask, “How do I get started?”

Layered Approach

Layered Approach

The IT approach to layered security for systems, infrastructure and data is increasingly impacting the security department, and with good reason.



Ballet to Security

I admit there is not a lot in common between ballet and a security installation.

Securing the “New” Higher Ground

Securing the “New” Higher Ground

While these unmanned aircrafts are mostly used professionally and recreationally to add depth and intrigue to films and videos, security teams need to be aware of the threats they could pose on those below.

The Role of PIAM

The Role of PIAM

The proliferation of networked devices has increasingly brought IT to the table when discussing physical security.

Company Credential

By fully identifying and mitigating the practices which leave businesses vulnerable—and then investing in employee awareness training—you’ll greatly reduce risk while cultivating a more educated workforce.

More Than A Concept

More Than A Concept

Integration of security systems is more than a concept or plan for Jeff Comeaux. It has become a passion and a calling.

Operations and People

Today, the God’s Love team relies on the Security Center unified platform to make sure that operations are running smoothly and that people are safe.

Network Protection

Hacking has become a threat far bigger than most think. Indeed, the greatest threat to national security these days comes from not from aircraft carriers or infantry divisions, but a computer with a simple Internet connection located anywhere in the world.

Luck of the Draw

Takahashi’s journey into the security industry isn’t necessarily a conventional one, as he explains it. He never thought an out-ofcollege entry level position would turn into a career.

Grant Management

In Kaua’i County, Hawaii, grants management has long been an important part of local government operations. It’s also been handled using paper.

On the Beach Front

On the Beach Front

Bel-Air Bay Club staff gives the system rave reviews and its ability to improve their relationships with club members.

Safer Cities

Safe City initiatives are a great way to build an efficient, proactive security posture to enhance safety and propel increased collaboration between city officials, security leaders, law enforcement and first responders.

Not a Catch-all

Not a Catch-all

While the technology can add an effective, additional layer of cybersecurity, it’s not a catch-all. In fact, the very nature of biometric technology can introduce additional security gaps.

Eyes On You

Eyes On You

In the world of law enforcement, the subject of body-worn cameras has arguably become the biggest talking point.

Data Capture

Data Capture

A large, outdoor shopping plaza located in a major city in Italy is home to a wide array of retailers, restaurants and kiosks designed to meet the varying needs of consumers across the region.

What Every Security Integrator Should Know

There are few who would argue that security technology offerings have changed and matured at an incredible pace over the last 10 to 15 years.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.