Top Stories


Red Hawk Fire & Security Grows with New Florida-based Acquisition

ISOF President Walter Wiseman believes aligning with one of the top independent integrators in the industry will add significant value to customers.

Paris Guard Fires on Man with Machete at Louvre

Paris Guard Fires on Man with Machete at Louvre

Police in Paris have arrested a man after he attacked a soldier near the Louvre.

Westinghouse Security Integrates its Z-Wave Enabled RTS Electronic Lock with Alarm.com Platform

Westinghouse Security announces the integration of its RTS lock, including Z-Wave technology, with Alarm.com’s leading platform for the intelligently connected home and business



Prison Inmates in Delaware Take Guards Hostage, 1 Dead

Prison Inmates in Delaware Take Guards Hostage, 1 Dead

One prison guard was pronounced dead at the prison.

Security Tight for Super Bowl Sunday

Security Tight for Super Bowl Sunday

Local, federal, state and private security officials are teaming up to create a security stronghold that protects a three mile area around the stadium.

Jody Ross Promoted to Vice President of Global Sales and Business Development

AMAG Technology is pleased to announce that Jody Ross has been promoted to Vice President of Global Sales and Business Development for AMAG Technology.

City of Houston Deploys Axis Cameras to ensure public safety during Super Bowl LIVE

Site of 10-day fan festival in downtown Houston to feature Axis video and audio products.

The Cloud Keeps Evolving in 2017

The Cloud Keeps Evolving in 2017

Earlier in 2016, when Gartner analysts stated that by 2020, 80 percent of all software will be offered on a subscription basis—this did not come as surprise to us at Genetec.

Bandwidth Throttling

VMS Bandwidth Saving Technologies

Beyond the core functionalities of recording and displaying video, one of the most important capabilities of modern Video Management Software platforms is the ability to reduce bandwidth required for transmitting live video.

Making IP Video Cyber Secure

Financial institutions have been historically slow to adopt IP video surveillance citing concerns about possibly compromising network security.

Controlling The Keys

Controlling The Keys

After a year of in–depth research and testing of many systems, the RJUSD found CyberLock’s access control system to be the solution that best fit the district’s needs, including installation and maintenance.

See What You’re Missing

Fraud prevention, it’s time to get better acquainted with your security team. You may see them in the hallways, have a coffee with them in the breakroom, and possibly join them on the dance floor at your annual holiday party.

Alarming Trend with Police

I’ve been writing, professionally, for 40 years. The first story that I ever worked on was a triple homicide, and a contract murder that was related. Back then, I didn’t think reporting could get any worse.

Stop Lingering

Security threats are on the rise and as IT security teams increase their scrutiny of all network-connected devices, it’s time for some new thinking about the design and maintenance of building security systems.

Security by the Book

Security by the Book

Pick any county in the United States, money is scarce to non-existent, and in the pecking order of who gets the available money, the county library is way down the line.

The Connected World

The Connected World

The abundance of networked solutions and devices—both security and nonsecurity— has exploded in recent years, providing unparalleled convenience and efficiency.

Emergency Security

Based in Milwaukee, Wisconsin, Bell Ambulance Company has been in operation since 1977, growing into the largest provider of ambulance services in the state. The company responds to around 75,000 calls per year and provides a range of services.

Triggers for Transition

It can be difficult to decide whether and when to make the transition to new access control technology. Transitions are often delayed over budget concerns or because of worries that the process will adversely impact productivity and workflow.

Featured

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.