Top Stories


Hackers Take Over Outlander PHEV

Hackers Take Over Outlander PHEV

A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm.

TSA to Undergo Covert Security Tests this Summer

TSA to Undergo Covert Security Tests this Summer

The Transportation Security Administration at airports around the country will be undergoing covert security tests over the summer.

Champion Group of Companies Unveils New Corporate Website

Premier provider of integrated security and low-voltage system technologies brings all of its companies under one umbrella with launch of new corporate website.



Open Options Partners with NEC to Provide DNA Fusion Customers Ultimate System Redundancy

Open Options has partnered with NEC Corporation of America (NEC) to offer DNA Fusion access control software users a high available and redundancy solution

Facebook Vulnerability Allows Hacker to Alter Conversations

Facebook Vulnerability Allows Hacker to Alter Conversations

A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.

Advanced Power Management Solutions Creates New Revenue Opportunities

Advanced Power Management Solutions Creates New Revenue Opportunities

Managed power is an essential element in a comprehensive security solution and its continued evolution helps ensure the operational integrity of today’s integrated systems.

Euro 2016: France Increasing Security Surrounding Stadiums

Euro 2016: France Increasing Security Surrounding Stadiums

Get the latest news on the security surrounding the Euro 2016 championship in France.

Monitronics Announces Availability of Alexa Skill for Amazon Echo

New Skill for Amazon Echo Adds Security and Convenience to Smarter Home Security

Solid ROI Metrics Support Case for PIAM

Solid ROI Metrics Support Case for PIAM

By definition, PIAM is an end-to-end solution that manages identities, compliance and events across disparate physical security systems.

Paxton Net2 Access Control Integrates with Dahua Video Integration Platform

Paxton has announced the integration of its networked access control system, Net2, with a leading manufacturer of professional security and surveillance equipment, Dahua.

Federal Reserve Victim to Over 50 Cybersecurity Breaches

Federal Reserve Victim to Over 50 Cybersecurity Breaches

Records show that the Federal Reserve has suffered through over 50 cybersecurity breaches in less than four years.

2 Dead in UCLA Murder-Suicide

2 Dead in UCLA Murder-Suicide

Two people were killed at UCLA in a murder-suicide.

Big Data Deal

Big Data Deal

From cyber attacks and organized retail crime, to the explosive growth of omni-channel and digital currencies, there is no shortage of new challenges facing retailers today.

Seeing Huge Growth

Seeing Huge Growth

Breaches into healthcare facilities—both physical and through the network—are all over the news. Healthcare IT News reports that five of the eight largest healthcare cyber security breaches since 2010 occurred in 2015, so this isn’t a problem that’s going away as technology becomes more sophisticated.

Revolving Security

Revolving Security

After revolving doors emerged on the architectural scene in the late 19th century, they were very much in vogue and favored as a way to provide building access stylishly.

Low Frequencies

Low Frequencies

Because the city recently adopted the 2013 Edition of NFPA 72 and the IBC 2012/IFC 2012, it was necessary to upgrade the voice system and notification devices in addition to the fire alarm control panel.

A Conduit For Attack

A Conduit For Attack

In the days of analog DVR-based surveillance systems, the biggest worries retailers faced were equipment failure and theft of the recording medium.

Diagnosing Healthcare Security

Diagnosing Healthcare Security

Healthcare systems represent one of the most challenging environments to secure. The need to balance an appropriate level of security while providing a welcoming environment geared towards patient care is essential.

Featured

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

  • Gun Violence Report Finds Retail Spaces, K-12 Schools Most Targeted

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, today announced the release of its annual Gun Violence Report, offering a deep dive into the landscape of gun-related incidents across the United States. This analysis extends beyond mass fatality events, providing a more nuanced understanding of when, where, and why shootings occur. Read Now

  • Agentic AI Will Revolutionize Cybercrime in 2025 According to New Report

    Malwarebytes, a provider in real-time cyber protection, recently released its 2025 State of Malware report, which reveals insight into the emergence of agentic artificial intelligence (AI), plus the year’s most prominent threats and cybercrime tactics. The report details a significant uptick in the number of known ransomware attacks, the total value of ransoms paid in 2024, and how IT teams can address them. Read Now

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.