Top Stories


Terror Attack in Israel Leaves 4 Dead

Terror Attack in Israel Leaves 4 Dead

Gunmen open fired on Tel Aviv marketplace in Israel killing four and injuring at least 13 more.

Hackers Take Over Outlander PHEV

Hackers Take Over Outlander PHEV

A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm.

TSA to Undergo Covert Security Tests this Summer

TSA to Undergo Covert Security Tests this Summer

The Transportation Security Administration at airports around the country will be undergoing covert security tests over the summer.



Champion Group of Companies Unveils New Corporate Website

Premier provider of integrated security and low-voltage system technologies brings all of its companies under one umbrella with launch of new corporate website.

Open Options Partners with NEC to Provide DNA Fusion Customers Ultimate System Redundancy

Open Options has partnered with NEC Corporation of America (NEC) to offer DNA Fusion access control software users a high available and redundancy solution

Facebook Vulnerability Allows Hacker to Alter Conversations

Facebook Vulnerability Allows Hacker to Alter Conversations

A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.

Advanced Power Management Solutions Creates New Revenue Opportunities

Advanced Power Management Solutions Creates New Revenue Opportunities

Managed power is an essential element in a comprehensive security solution and its continued evolution helps ensure the operational integrity of today’s integrated systems.

Euro 2016: France Increasing Security Surrounding Stadiums

Euro 2016: France Increasing Security Surrounding Stadiums

Get the latest news on the security surrounding the Euro 2016 championship in France.

Monitronics Announces Availability of Alexa Skill for Amazon Echo

New Skill for Amazon Echo Adds Security and Convenience to Smarter Home Security

Solid ROI Metrics Support Case for PIAM

Solid ROI Metrics Support Case for PIAM

By definition, PIAM is an end-to-end solution that manages identities, compliance and events across disparate physical security systems.

Paxton Net2 Access Control Integrates with Dahua Video Integration Platform

Paxton has announced the integration of its networked access control system, Net2, with a leading manufacturer of professional security and surveillance equipment, Dahua.

Federal Reserve Victim to Over 50 Cybersecurity Breaches

Federal Reserve Victim to Over 50 Cybersecurity Breaches

Records show that the Federal Reserve has suffered through over 50 cybersecurity breaches in less than four years.

2 Dead in UCLA Murder-Suicide

2 Dead in UCLA Murder-Suicide

Two people were killed at UCLA in a murder-suicide.

Big Data Deal

Big Data Deal

From cyber attacks and organized retail crime, to the explosive growth of omni-channel and digital currencies, there is no shortage of new challenges facing retailers today.

Seeing Huge Growth

Seeing Huge Growth

Breaches into healthcare facilities—both physical and through the network—are all over the news. Healthcare IT News reports that five of the eight largest healthcare cyber security breaches since 2010 occurred in 2015, so this isn’t a problem that’s going away as technology becomes more sophisticated.

Revolving Security

Revolving Security

After revolving doors emerged on the architectural scene in the late 19th century, they were very much in vogue and favored as a way to provide building access stylishly.

Low Frequencies

Low Frequencies

Because the city recently adopted the 2013 Edition of NFPA 72 and the IBC 2012/IFC 2012, it was necessary to upgrade the voice system and notification devices in addition to the fire alarm control panel.

A Conduit For Attack

A Conduit For Attack

In the days of analog DVR-based surveillance systems, the biggest worries retailers faced were equipment failure and theft of the recording medium.

Featured

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

  • Mission 500 Debuts Refreshed Identity Ahead of Security 5K/2K at ISC West

    Mission 500, the security industry’s nonprofit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, has unveiled a refreshed brand identity ahead of ISC West. The charity’s new look includes a modernized logo with refined messaging to reinforce Mission 500’s nearly decade-long commitment to serving the needs of children and families in crisis. Read Now

    • Industry Events
  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.