Top Stories


Stop Lingering

Security threats are on the rise and as IT security teams increase their scrutiny of all network-connected devices, it’s time for some new thinking about the design and maintenance of building security systems.

Security by the Book

Security by the Book

Pick any county in the United States, money is scarce to non-existent, and in the pecking order of who gets the available money, the county library is way down the line.

The Connected World

The Connected World

The abundance of networked solutions and devices—both security and nonsecurity— has exploded in recent years, providing unparalleled convenience and efficiency.



Emergency Security

Based in Milwaukee, Wisconsin, Bell Ambulance Company has been in operation since 1977, growing into the largest provider of ambulance services in the state. The company responds to around 75,000 calls per year and provides a range of services.

Triggers for Transition

It can be difficult to decide whether and when to make the transition to new access control technology. Transitions are often delayed over budget concerns or because of worries that the process will adversely impact productivity and workflow.

Dissecting the Advantages

Physical identity access management (PIAM) solutions have changed the way leading organizations approach security.

Terminal Upgrade

Terminal Upgrade

Terminal One at JFK International Airport had relied on a limited analog surveillance system and a separate, older IP system that were independent of each other.

Port-ability

When it comes to protecting transportation hubs, seaports have their own set of challenges.

Oklahoma Sheriff to Deploy Body Cameras after 2015 Fatal Shooting

Oklahoma Sheriff to Deploy Body Cameras after 2015 Fatal Shooting

In 2015, an ex-deputy shot and killed an unarmed black man.

Everything You Need to Know about the Travel Ban

Everything You Need to Know about the Travel Ban

On Friday, January 27, President Trump signed an executive order that excluded travel from seven countries.

6 Dead in Quebec Mosque Shooting

6 Dead in Quebec Mosque Shooting

A group of gunman entered a mosque in Quebec and open fired killing six.

Moni Smart Security Introduces Customer Bill of Rights

Company Leads Change in Customer Interaction with Home Security Providers

Dallas Police Department Gets $1 Million for Protective Gear

Dallas Police Department Gets $1 Million for Protective Gear

Governor Greg Abbot announced the funds would be given to the police department so they could outfit officers with new helmets, bullet proof vests.

Tight Security Surrounding GOP Retreat in Philly

Tight Security Surrounding GOP Retreat in Philly

Philadelphia is stepping up security as President Trump arrives for the GOP Retreat.

'Torture Works' President Trump to Revive Practice?

A draft order outlining many things including the revival of torture was published Wednesday.

President Trump’s Executive Orders on Border Security

President Trump's Executive Orders on Border Security

President Trump is expected to sign two executive orders on Wednesday relating to border security.

Hacker Tells POTUS to Change Twitter Security Settings

Hacker Tells POTUS to Change Twitter Security Settings

A hacker just wants President Trump to change his security settings on Twitter.

Historic Inauguration Day Begins Amid Protests, Tight Security

Historic Inauguration Day Begins Amid Protests, Tight Security

Security for the Inauguration is tight as protests swarm and a new president is sworn in.

Featured

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

  • Gun Violence Report Finds Retail Spaces, K-12 Schools Most Targeted

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, today announced the release of its annual Gun Violence Report, offering a deep dive into the landscape of gun-related incidents across the United States. This analysis extends beyond mass fatality events, providing a more nuanced understanding of when, where, and why shootings occur. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.