Top Stories


Star Tribune names IdentiSys Inc. a 2016 Top Workplace

IdentiSys Inc. has been named one of the Top 150 Workplaces in Minnesota by the Star Tribune.

At Least 10 Injured at California Rally

At Least 10 Injured at California Rally

At least 10 were injured when a white supremacist group and counter-protesters clashed at a rally on the Sacramento Capitol steps Sunday, June 26.

Vanderbilt SMS Streamlines Access, Integrates Multiple Systems for Historic Ripon College

It was critical for Ripon to deploy a comprehensive safety and security program that streamlined access management across the expansive campus.



Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.

British Politician Dies after Attack in Birstall

British Politician Dies after Attack in Birstall

British Politician Jo Cox was attacked on June 16 in Birstall. She later died of her injuries.

NFL Hires Cybersecurity Firm after Social Media Hacks

NFL Hires Cybersecurity Firm after Social Media Hacks

The NFL has hired cybersecurity firm, K2 Intelligence, to help teach players how to use social media.

IDIS Highlights Retail Video Surveillance Solutions in NRF PROTECT Loss Prevention Expo Debut

At NRF PROTECT 2016, IDIS will demonstrate its total surveillance solution for the retail marketplace, featuring its powerful 5MP 360° Super Fisheye Camera, intuitive Smart UX camera controls, and new video analytics offerings.

STANLEY Security Recognized by CivilianJobs.com as Winner of 2016 MVE for Military

STANLEY Security has been recognized by CivilianJobs.com, connecting America’s military personnel with civilian careers, as a Most Valuable Employer (MVE) for Military.

VidCon Increases Security in Wake of Florida Shootings

VidCon Increases Security in Wake of Florida Shootings

Officials of VidCon, a conference that brings Social Network stars and their fans together, will see increased security in the wake of the shootings in Florida.

Quantum Secure Promotes Don Campbell to Vice President of Product

Experienced Executive to Continue to Drive Growth and Momentum of Company’s Industry-Leading PIAM Solution.

Shots Fired at Dallas Love Field Airport

Shots Fired at Dallas Love Field Airport

Shots were fired by an officers responding to a domestic dispute at Dallas Love Field Airport.

Common Password is Revealed in Massive Twitter Heist

Common Password is Revealed in Massive Twitter Heist

If your password for the social media platform, Twitter, is 123456 then you might need to change things up a little bit.

Appeals Court: States Can Restrict Concealed Weapons

Appeals Court: States Can Restrict Concealed Weapons

A federal appeals court ruled that there is no Second Amendment protection for concealed weapons.

Hackers Take Over Outlander PHEV

Hackers Take Over Outlander PHEV

A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm.

TSA to Undergo Covert Security Tests this Summer

TSA to Undergo Covert Security Tests this Summer

The Transportation Security Administration at airports around the country will be undergoing covert security tests over the summer.

Champion Group of Companies Unveils New Corporate Website

Premier provider of integrated security and low-voltage system technologies brings all of its companies under one umbrella with launch of new corporate website.

Open Options Partners with NEC to Provide DNA Fusion Customers Ultimate System Redundancy

Open Options has partnered with NEC Corporation of America (NEC) to offer DNA Fusion access control software users a high available and redundancy solution

Facebook Vulnerability Allows Hacker to Alter Conversations

Facebook Vulnerability Allows Hacker to Alter Conversations

A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.