Top Stories


Facebook Vulnerability Allows Hacker to Alter Conversations

Facebook Vulnerability Allows Hacker to Alter Conversations

A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.

Advanced Power Management Solutions Creates New Revenue Opportunities

Advanced Power Management Solutions Creates New Revenue Opportunities

Managed power is an essential element in a comprehensive security solution and its continued evolution helps ensure the operational integrity of today’s integrated systems.

Euro 2016: France Increasing Security Surrounding Stadiums

Euro 2016: France Increasing Security Surrounding Stadiums

Get the latest news on the security surrounding the Euro 2016 championship in France.



Monitronics Announces Availability of Alexa Skill for Amazon Echo

New Skill for Amazon Echo Adds Security and Convenience to Smarter Home Security

Solid ROI Metrics Support Case for PIAM

Solid ROI Metrics Support Case for PIAM

By definition, PIAM is an end-to-end solution that manages identities, compliance and events across disparate physical security systems.

Paxton Net2 Access Control Integrates with Dahua Video Integration Platform

Paxton has announced the integration of its networked access control system, Net2, with a leading manufacturer of professional security and surveillance equipment, Dahua.

Federal Reserve Victim to Over 50 Cybersecurity Breaches

Federal Reserve Victim to Over 50 Cybersecurity Breaches

Records show that the Federal Reserve has suffered through over 50 cybersecurity breaches in less than four years.

2 Dead in UCLA Murder-Suicide

2 Dead in UCLA Murder-Suicide

Two people were killed at UCLA in a murder-suicide.

Big Data Deal

Big Data Deal

From cyber attacks and organized retail crime, to the explosive growth of omni-channel and digital currencies, there is no shortage of new challenges facing retailers today.

Seeing Huge Growth

Seeing Huge Growth

Breaches into healthcare facilities—both physical and through the network—are all over the news. Healthcare IT News reports that five of the eight largest healthcare cyber security breaches since 2010 occurred in 2015, so this isn’t a problem that’s going away as technology becomes more sophisticated.

Revolving Security

Revolving Security

After revolving doors emerged on the architectural scene in the late 19th century, they were very much in vogue and favored as a way to provide building access stylishly.

Low Frequencies

Low Frequencies

Because the city recently adopted the 2013 Edition of NFPA 72 and the IBC 2012/IFC 2012, it was necessary to upgrade the voice system and notification devices in addition to the fire alarm control panel.

A Conduit For Attack

A Conduit For Attack

In the days of analog DVR-based surveillance systems, the biggest worries retailers faced were equipment failure and theft of the recording medium.

Diagnosing Healthcare Security

Diagnosing Healthcare Security

Healthcare systems represent one of the most challenging environments to secure. The need to balance an appropriate level of security while providing a welcoming environment geared towards patient care is essential.

A Grand Experience

A Grand Experience

Davenport Hotels has relied on an analog video surveillance system for the existing hotel facilities and structures. For the new Davenport Grand Hotel, hotel management wanted to ensure the safety and security of its guests, employees, and visitors while helping to prevent theft and other loss.

Keeping Remote Facilities Safe and Secure

Keeping Remote Facilities Safe and Secure

Companies operating in high-risk, remote locations must take extra precautions to ensure the safety of their employees, assets and infrastructure.

ACRE Appoints New President of Mercury Security

ACRE has named Matthew Barnette as the new President of Mercury Security.

Why You Should Delete Your MySpace Page

Why You Should Delete Your MySpace Page

Hundreds of millions of hacked account details from social media networks such as MySpace and Tumblr have been advertised for sale online.

Featured

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.