Top Stories


How to prepare your network and defend against the “Gadget Hordes”

How to Prepare Your Network and Defend Against the “Gadget Hordes”

With each passing year, network and security administrators have been faced with more and more devices appearing inside the walls of their corporate network.

Warren Associates To Market and Sell SALTO Systems Electronic Lock Solutions in Northern California, Rocky Mountain States

SALTO Systems has hired Warren Associates to market and sell SALTO’s innovative security products in Northern California, Northern Nevada, Utah, Colorado, Montana, New Mexico, Wyoming, and Idaho.

Live From ISC West 2017 Now Available

Live From ISC West 2017 Now Available

The live webpage will frequently update with content from the show floor.



Sielox Offers New Lock Toggle for 1700 Intelligent Controller

Fully integrated with Schlage AD, NDE and LE wireless locks

London Anticipated Terrorist Attack

London Anticipated Terrorist Attack

Current events around the world helped London to quickly stop a suspected terrorist attack.

MONI Smart Security to Emerge at ISC West 2017 Better Faster and Stronger

New programs, partnerships and accolades command recognition

British Parliament on Lockdown after Incident Outside

London: ISIS Claims Attack, Number Injured Rises, Suspect Identified

London police responded to a security incident outside the UK House of Commons.

Tech Ban on Some Foreign Flights into the US

Tech Ban on Some Foreign Flights into the U.S.

TSA recently ordered nine airlines to stop passengers from bringing most types of tech on board.

If You Build It, They will Come - IoT Driven Botnet Attacks

If You Build It, They Will Come - IoT Driven Botnet Attacks

Regardless of term, or use case, it’s well-known that cybercriminals can hack into any vulnerable device connected to the internet to remotely take control of that device and enslave it into a botnet that is part of a distributed denial-of-service (DDoS) attack.

Reports of Potential Data Breach at Saks Fifth Ave

Reports of Potential Data Breach at Saks Fifth Ave

Over the weekend, Saks Fifth Ave reported that customers’ data may be exposed.

FBI Director: No Evidence of Wiretap

FBI Director: No Evidence of Wiretap

In a hearing with the Intelligence Committee, FBI Director James Comey said there was no evidence to support President Trump’s tweets claiming Trump Tower was wiretapped by former President Obama.

Why is the Security Industry Failing?

Why is the Security Industry Failing?

We have failed to focus on what’s most important: building security in.

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung to Offer Monthly Security Updates for Unlocked Handsets

Samsung will finally offer monthly security updates.

Stopping the Post-EMV Surge in Online Fraud

Stopping the Post-EMV Surge in Online Fraud

The predicted increase in online fraud in the U.S. has arrived with the adoption of chip card technology.

Brivo Announces Partnership with Mercury Security

Brivo Announces Partnership with Mercury Security To Support An Open Hardware Platform for its Access Control Solution

4 Charged in Yahoo Data Breach

4 Charged in Yahoo Data Breach

Four people, including two officers from Russian security services, were charged by the U.S. in the massive data breach that plagued Yahoo.

Homeland Security Finds Human Vetting More Effective than Computers

Homeland Security Finds Human Vetting More Effective than Computers

Report finds scanning social media accounts is best done by humans.

Panel of Industry Execs to Discuss the Impact of the IoT at ISC West 2017

Panel to Address Benefits and Downside of Technologies Driving Networked Systems

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.