Top Stories


Security Companies Develop Real-time Maps of Cyberattacks

Security Companies Develop Real-time Maps of Cyberattacks

Recent hacks expose personal information about millions of people.

Hacking Vehicles for a Joy Ride

Hacking Vehicles for a Joy Ride

Internet-connected vehicles becoming target for tech-savvy cyber criminals.

Wired Lists the Windows 10 Security Settings worth Knowing

Wired Lists the Windows 10 Security Settings worth Knowing

Windows 10 features a number of security updates and settings that are important to know, even if you didn’t read the fine print.



Pelco and Agent Vi Partner to Provide Superior Video Analytics Solution

Seamless integration between Pelco’s powerful and intuitive VideoXpert Video Management System and the comprehensive suite of video analytics capabilities of Agent Vi’s savVi software delivers rapid results and an unparalleled user experience.

City of Lakeland, FL Chooses Genetec Technology to Improve Security

Security Center unifies security operations across waste and water facilities, police and fire departments, city hall, libraries, park and recreation buildings, public works facilities, the regional airport and others.

Fire-Lite Alarms Latest Wireless Advancements Yield New Dealer Opportunities

New technology, listings, training and software expand dealer support and offer more solutions for traditional and non-traditional applications.

Universal Protection Service to Acquire Guardsmark

Merger produces the largest U.S.-owned security company.

Protection 1 Celebrates Third Annual Day of Community Service

Protection 1 Team Members Volunteered at Local Organizations across the Country for “All for 1 Day."

AMAG Technology Releases Symmetry CompleteView 4.5 Video Management System

Symmetry CompleteView VMS and Symmetry PowerProtect NVRs offer faster processes, performance gains and increased storage.

Oncam Expands Americas Headquarters in Boston Tech Corridor

New location to support rapid market growth, tap into area’s engineering expertise.

Public Wi-Fi Users Neglect Security Precautions

Public Wi-Fi Users Neglect Security Precautions

Some public Wi-Fi hotspots are provided by con artists.

DHS Issues Warning about Hobbyist Drones

DHS Issues Warning about Hobbyist Drones

Recreational drones could be used by adversaries to attack the United States.

Part 7: Refocus on the Glide Path

Part 7: Refocus on the Glide Path

Intersecting business into the professionalization of information security debate.

Senator and Comedian Team Up for Gun Control

Senator and Comedian Team Up for Gun Control

Gun violence became a personal issue due to Lafayette, Louisiana movie theater shooting on July 23, 2015 during the movie Trainwreck.

Zscaler Raises $100M in Funding

Zscaler Raises 100M in Funding

The funding was led by TPG Growth.

Part 6: Taking Control of the Stick

Part 6: Taking Control of the Stick

5 steps to help professionalize the cybersecurity workforce.

Navigating the High Seas

Navigating the High Seas

In recent years, the cruise industry has received a lot of attention from the news media regarding serious security issues onboard its vessels, ranging from people falling overboard to sexual assaults.

Everyone Is At Risk

Technology is amazing stuff. However, some of the greatest threats that today’s businessman or woman faces is a cyberattack. Just count the number of breaches in the last couple of years; you know what I mean.

Shifting the Selling Paradigm

Shifting the Selling Paradigm

With the increased focus on home automation and associated “smart home” devices, it is incumbent on security dealers, installers and integrators to do more than simply sell security products.

Access Control in the Midst of an IP Revolution

Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.

Featured

  • Cutting Retail Losses

    Retail is still a more complex and dynamic security vertical in modern society. Inherent challenges with in-store and distribution center operations are primarily due to constantly shifting consumer buying trends. Retailers must show daily flexibility to keep workers, meet sales goals and attract customers while maintaining safe and efficient operations. Retail is an intricate web of interconnected elements. Read Now

  • The Key to Wellbeing in the Office

    A few years ago, all we saw in the news was the ‘great resignation.’ Now we have another ‘great’ to deal with. According to CBRE, 2023 was the start of the ‘great return’ as office workers returned to their normal offices after working from home. The data shows that two-thirds of all U.S office buildings were more than 90% leased as of Q2 2023. Read Now

  • Failed Cybersecurity Controls Costing U.S. Businesses $30 Billion Yearly

    Panaseer recently released ControlWatch and the Continuous Controls Battle: Panaseer 2025 Security Leaders Report examining the cost of cybersecurity control failures and the impact of growing personal liability for security failings on security leaders. The report analyzes the findings of a survey of 400 security decision makers (SDMs) across the US and UK. It shows that security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps. Read Now

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3