Top Stories


Extraordinary Protection

Following several high-profile incidents alleging abuse special needs students (including some non-communicative students), and the activism of a number of parent groups in the state of texas, governor greg abbott signed texas senate bill 507, requiring districts to install audio and video surveillance equipment into select special education classrooms when requested.

Detecting And Mitigating

Detecting And Mitigating

Insider threat has become an increasingly prevalent concern for organizations, and the damage from breaches caused by current or former employees, contractors or partners misusing access credentials can be devastating.

Understanding Interoperability

Understanding Interoperability

Since 9/11, travel through the world’s busiest airports has changed dramatically. Security professionals are focused on extensive security investments to protect these “Soft Targets” from threats, including terrorist attacks, crime, theft and vandalism.



What You Need To Know

Being in school every day is vital for a student’s success, and with state funding associated with attendance, it is also vital that school districts keep close track of when students are in school and when they are not.

Plan Of Action

As concerns for campus safety rapidly rise within higher education communities, it is important to implement a proactive plan as the first step to acknowledging your security needs.

Lack of Ethics is a Problem

The pharmaceutical industry is a business exposed to many unique risks. Attaining capital, investing in intensive research and development, the uncertainty of FDA approval and the constant shroud of legislative risks are merely some of the many significant challenges that innovative pharmaceutical companies regularly face.

How Safe Is Your Campus?

Effective campus security consists of more than just a budget line-item and the proverbial “knocking on wood” in today’s day and age.

Planning Ahead

One of the most important things that you can do at the start of a new year is to refine your business plan with both short and long-term goals.

Class Is In Session

Class Is In Session

Students and the facilities in which they attend classes face more threats in today’s society than at any other point in history.

Today's Technology - An Insider's View

Video surveillance permeates our lives today; it is part of a changing world. We recently sat down with Jeff Whitney, vice president of marketing for megapixel camera manufacturer Arecont Vision to get an industry insider’s view on where the video surveillance market is today, how we got here, where we can expect it go in the near future, and what his own company is doing to keep up.

Streamlining Arena Security

Streamlining Arena Security

Frustrated with a faulty analog security setup, Chicago’s United Center set out to raise their technology standards and centralize operations through a network system.

Leveraging Data

Leveraging Data

Campus security, both in a corporate and higher education setting, can be improved by leveraging data from access control systems to drive future security decisions.

Conquering A Feeding Frenzy

Conquering A Feeding Frenzy

Pensacola christian college (pcc), in northwest florida, is located just off the warm emerald waters of florida’s gulf coast. pcc became a reality in 1974 when 100 students arrived at the college’s one building.

Increasing Profits

Increasing Profits

In our last contributed article, Anixter examined the topic of “Sourcing to Become a Leaner Organization.” Here we take a look at another important component of increasing profitability—Reducing and Managing Non-Productive Labor.

Biggest Security Incidents of 2016

Biggest Security Incidents of 2016

Vehicle attacks, hacks and police ambushes make the list of top physical security events of 2016.

The Continuing Evolution of Power and Transmission Solutions

The Continuing Evolution of Power and Transmission Solutions

Thanks to a number of new technology advancements, power supplies and transmission solutions with network management features are a natural progression for ensuring the reliability of today’s IP-based physical security systems.

Guide for Protecting your Company against Insider Threats

Guide for Protecting your Company against Insider Threats

Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.

2017 Encryption Landscape

2017 Encryption Landscape

There is a growing belief that 2017 will be a decisive year in the battle over encryption that has been quietly raging for over 25 years.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.