Top Stories


Your Best Project: Ten Security Design Tools You Must Try

Your Best Project: Ten Security Design Tools You Must Try

Network design is challenging, requiring designers to balance user performance expectations with network-resource costs, capacities, capabilities, and use scenarios.

On the Heels of a Hurricane

Only a week ago, Topical Storm Hermine made landfall in Florida. I think we're pretty safe attending ASIS in Orlando, but Florida is always in the crosshairs. A "hurricane" in its own right will hit Orlando next week when ASIS touches down.

The Art of Security

The Art of Security

Located just an hour west of Boston, the Worcester Art Museum is world-renowned for its 35,000-piece collection of paintings, sculptures, photographic prints, drawings and new media.



Is It a Crisis?

The phrases critical communications and crisis communications are used interchangeably. However, they are synergistic building blocks.

Axis and Canon Announce Change of Global Sales and Marketing Framework for Network Video Portfolio

Axis Communications and Canon Inc. announced today an agreement under which the two companies would change their sales and marketing efforts in major regional markets worldwide.

Practical Protection

For most startup companies, paying for security management may not be a possibility. Budget constraints, business plans and other factors can lead to security taking a backseat to a company’s long list of other priorities.

Combatting Insider Threat

The recent disappearance of Egypt Air Flight MS804 on May 19 has once again highlighted the issues of insider threat at airports.

Monitronics Announces Exclusive Benefits for AARP Members

Company to provide discount on residential security services for members of prominent non-profit.

Joint Base Andrews in Lockdown due to Active Shooter Situation

Joint Base Andrews in Lockdown due to Active Shooter Situation

Joint Base Andrews in Maryland has been placed on lockdown following a report of an active shooter.

4 Critical Components of Tomorrow’s Cyber Security Incident Response

4 Critical Components of Tomorrow's Cyber Security Incident Response

Each of these four key components are essential in establishing a solid defense against would-be cyber-attacks.

41 Dead in Istanbul Terror Attack

41 Dead in Istanbul Terror Attack

41 died and more than 230 more were injured when three men open fired and set off explosives at a Turkish airport.

Mission 500 Takes the Field for Children in Need

Second Annual Security Industry Softball Game Scheduled for August 20.

Monitronics Donates $20,000 in Security to Local Women's Shelter

Monitronics donated $20,000 in security hardware and monitoring to the Agape Women’s Shelter, including new professionally-installed, monitored security systems throughout the shelter and in all of the residents’ homes.

Intel Open to Selling Security Software Business

Intel Open to Selling Security Software Business

Intel could never make full use of the McAfee business, which it bought in 2010.

Star Tribune names IdentiSys Inc. a 2016 Top Workplace

IdentiSys Inc. has been named one of the Top 150 Workplaces in Minnesota by the Star Tribune.

At Least 10 Injured at California Rally

At Least 10 Injured at California Rally

At least 10 were injured when a white supremacist group and counter-protesters clashed at a rally on the Sacramento Capitol steps Sunday, June 26.

Vanderbilt SMS Streamlines Access, Integrates Multiple Systems for Historic Ripon College

It was critical for Ripon to deploy a comprehensive safety and security program that streamlined access management across the expansive campus.

German Cinema Attacker Killed by Police after Hostage Situation

German Cinema Attacker Killed by Police after Hostage Situation

German police shot and killed a rifle-wielding man Thursday after he open fired in a movie theater and took hostages.

Featured

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.