Top Stories


Online Exclusive: Managing Control System Access with an ID Card Solution

Automation and data solutions provider uses ID cards in an innovative way.

Dave Larson, COO of Corero Network Security, discusses DDoS attacks.

Online Exclusive: DDoS Attacks Fuel the Need for Modern Protection Methods

DDoS attack prevention is nearly impossible: it’s difficult to track down hackers, whereas it’s easy and inexpensive to launch a DDoS attack.

Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.



Dortronics Fills New Position of A&E Sales Coordinator

Dortronics today announced that Skip Burnham has joined the company to fill the newly created position of coordinating sales efforts through architects, engineers and specifiers.

A Breakdown of the Nation’s Unsecured Security Cameras

A Breakdown of the Nation's Unsecured Security Cameras

A security firm analyzed open security cameras and concluded which U.S. cities have the most unsecured cameras in use.

Airport Security Could Suffer from Brexit

Airport Security Could Suffer from Brexit

If Britain decides to leave the European Union, British airports may see a slump in security.

Louroe Electronics Showcases Live Gunshot Detection Demonstration

Louroe Electronics Showcases Live Gunshot Detection Demonstration

Schools, law enforcement and other institutions to experience first-hand the benefits and ease-of-use of cutting-edge audio analytics technology.

Security in Rio Questioned After Olympian Mugged

Security in Rio Questioned After Olympian Mugged

Australian Olympian, Liesl Tesch, was mugged outside the athlete accommodations in Rio.

Alternative Fire Alarm Reporting Communications Solutions for New & Old Systems:  Offer Monthly Savings & Meet New NFPA 72 Code

Alternative Fire Alarm Reporting Communications Solutions for New & Old Systems: Offer Monthly Savings & Meet New NFPA 72 Code

Under the latest 2016 edition requirements for Fire System Monitoring has changed drastically. The three options to keep current for fire system monitoring are two telephone lines requiring special, site specific AHJ approval; a single phone line plus another independent form of communications, or a Sole Path Fire Communicator or Equivalent.

FBI Release Timeline and Transcript of 911 Calls from Pulse Nightclub Shooting

FBI Release Timeline and Transcript of 911 Calls from Pulse Nightclub Shooting

Orlando Police and FBI released information about the sequence of events during the shooting that killed 49 and injured 53 more.

Thousands of Credit Cards Stolen from Acer Online Store

Thousands of Credit Cards Stolen from Acer Online Store

Acer has admitted to a data breach that affects more than 30,000 customers.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

Security Products Dad Will Love

Security Products Dad Will Love

Father’s Day is just around the corner; give Dad the gift of security with one of these products.

Plastic Surgeon Selects IDIS for Enhanced Security

Next-Generation IDIS Solution ensures robust safety and security environment for both patients and staff.

British Politician Dies after Attack in Birstall

British Politician Dies after Attack in Birstall

British Politician Jo Cox was attacked on June 16 in Birstall. She later died of her injuries.

NFL Hires Cybersecurity Firm after Social Media Hacks

NFL Hires Cybersecurity Firm after Social Media Hacks

The NFL has hired cybersecurity firm, K2 Intelligence, to help teach players how to use social media.

Mark Cuban to Donate $1 Million for Dallas Police Response to Orlando Shooting

Mark Cuban to Donate $1 Million for Dallas Police Response to Orlando Shooting

Dallas Mayor Mike Rawlings announced Mark Cuban will donate $1 million to the Dallas PD to help enhance counterterrorism efforts.

Toddler Attacked by Alligator at Disney’s Grand Floridian

Toddler Attacked by Alligator at Disney's Grand Floridian

The search continues for the 2-year-old that was dragged into a lagoon near Disney’s Grand Floridian.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities