Top Stories


BDCVideo's Orion Series for OnSSI

Partnership provides complete software and hardware appliance for security integrators.

LPR

ALPR Catches Virginia Shooter Fast, Public Takes Notice

Despite all the unknowns in this case, we do have one solid and incontrovertible fact: Flanagan was apprehended very quickly by Virginia State Police. The reason is because he was detected by an Automatic License Plate Recognition (ALPR) system.

ASIS International to Honor Military, Law Enforcement, & Emergency Medical Technicians at ASIS 2015

Complimentary one-day admission, Wednesday, September 30th.



A Text Message of Apology before Killing

A Text Message of Apology before Killing

Teenager texts apology to the parents of the students he was about to kill.

Top Baby Monitors Lack Basic Security Features

Top Baby Monitors Lack Basic Security Features

A new report says some of the top baby monitors are vulnerable to basic hacking attempts.

Yay or Nay for a U.S. Border Wall

Yay or Nay for a U.S. Border Wall

A brief history of unsuccessful attempts in light of current presidential debates between candidates.

PGE Fined for Security Breakdown

PG&E Fined for Security Breakdown

Pacific Gas & Electric has been fined $50,000 for an incident that occurred at its San Jose substation.

Proper Use

No one can argue that IP video surveillance cameras surpass their analog predecessors thanks to the higher resolution and vastly improved quality images.

The Best First Response

The Best First Response

The continuing threat posed by global terrorism has driven huge amounts of government investment into electronic surveillance, as well as both wide and targeted physical monitoring systems in our cities.

Who Does Your Engineering?

Security systems today are getting more sophisticated to some, and less to others.

Reducing opportunity for catastrophic compromised data

Securing Your Cloud

Cloud computing offers numerous benefits, such as powerful processing capabilities, improved access, higher availability and significant savings with on-demand hosting.

Meeting the challenging security needs of parking facilities

Parking Spaces

Parking facilities—both outdoor lots and structures—represent a significant security challenge. Most facilities are easily accessible to the public.

Secure Hosted Technology

Secure Hosted Technology

From data breaches to security system compromises, there’s a ‘cloud’ hanging over hosted environments, labeling them unsafe or subject to easy compromise.

Key Control Central

Airports have many security requirements and challenges, and part of the challenge arises because of the mix of people on-site, including airport staff, airline staff, contractor and vendor staff and travelers.

Back to Work

Phil Lake doesn’t have to work. He retired only to find himself back behind the desk running an integration company in Austin, Texas. His retirement, I guess, is working some more.

Knowing Your Access Control

Knowing Your Access Control

With four or more access points around your property, there is no way that you can keep eyes at all entry points, especially if all can’t be viewed from a single location.

Private and Secure

Private and Secure

The management needed to make sure the residents in their care were safe and secure in their rooms and within the facility itself. With an on-site pharmacy, securing and monitoring certain areas was also a priority.

Security Begins at Home

The majority of our editorial efforts focus on commercial and industrial security.

Boosting Response Time

It was important that all EMT workers wore the proper identification to help keep them safe and secure on the job, and allow hospitals and other facilities to recognize them quickly.

Analysis Turns Physical Security into Customer Service

Analysis Turns Physical Security into Customer Service

In recent years, customer service has become a new frontier for marketing and brand building.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3