Top Stories


All Too Common

All Too Common

On Dec.19, 2016, the news exploded with information about a vehicle attack on a Christmas market in Berlin that killed at least 12 people and injured over 50 more.

Using Social Media

Thirty-seven percent of people in the United States bought one or more smart devices in 2015, and many of the people in this large consumer market are tech savvy – so how do you tap into them? Having a broad online presence with positive messaging can help take your business to the next level. But, you may ask, “How do I get started?”

Layered Approach

Layered Approach

The IT approach to layered security for systems, infrastructure and data is increasingly impacting the security department, and with good reason.



Ballet to Security

I admit there is not a lot in common between ballet and a security installation.

Securing the “New” Higher Ground

Securing the “New” Higher Ground

While these unmanned aircrafts are mostly used professionally and recreationally to add depth and intrigue to films and videos, security teams need to be aware of the threats they could pose on those below.

The Role of PIAM

The Role of PIAM

The proliferation of networked devices has increasingly brought IT to the table when discussing physical security.

Company Credential

By fully identifying and mitigating the practices which leave businesses vulnerable—and then investing in employee awareness training—you’ll greatly reduce risk while cultivating a more educated workforce.

More Than A Concept

More Than A Concept

Integration of security systems is more than a concept or plan for Jeff Comeaux. It has become a passion and a calling.

Operations and People

Today, the God’s Love team relies on the Security Center unified platform to make sure that operations are running smoothly and that people are safe.

Network Protection

Hacking has become a threat far bigger than most think. Indeed, the greatest threat to national security these days comes from not from aircraft carriers or infantry divisions, but a computer with a simple Internet connection located anywhere in the world.

Luck of the Draw

Takahashi’s journey into the security industry isn’t necessarily a conventional one, as he explains it. He never thought an out-ofcollege entry level position would turn into a career.

Grant Management

In Kaua’i County, Hawaii, grants management has long been an important part of local government operations. It’s also been handled using paper.

On the Beach Front

On the Beach Front

Bel-Air Bay Club staff gives the system rave reviews and its ability to improve their relationships with club members.

Safer Cities

Safe City initiatives are a great way to build an efficient, proactive security posture to enhance safety and propel increased collaboration between city officials, security leaders, law enforcement and first responders.

Not a Catch-all

Not a Catch-all

While the technology can add an effective, additional layer of cybersecurity, it’s not a catch-all. In fact, the very nature of biometric technology can introduce additional security gaps.

Eyes On You

Eyes On You

In the world of law enforcement, the subject of body-worn cameras has arguably become the biggest talking point.

Data Capture

Data Capture

A large, outdoor shopping plaza located in a major city in Italy is home to a wide array of retailers, restaurants and kiosks designed to meet the varying needs of consumers across the region.

What Every Security Integrator Should Know

There are few who would argue that security technology offerings have changed and matured at an incredible pace over the last 10 to 15 years.

Featured

  • Creating More Versatility

    Today, AI has become top of mind for most security professionals. It is the topic of conversation in the technology world and continues to transform the way data is used to make important business decisions. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

  • Teaching AI New Tricks

    You have probably heard that AI-enabled security cameras are evolving the role of traditional surveillance cameras, shifting the focus from passive monitoring to active problem-solving and operational insights. AI technology changes fast, so what is new can be considered old news in just a few months. Read Now

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.