Top Stories


Alarm.com Launches Fully Integrated Doorbell Camera

Alarm.com announced new cameras and enhancements to its video service today. Alarm.com has added the Alarm.com Wi-Fi Doorbell Camera - Skybell HD Edition to the Alarm.com Smart Home Security Platform, offering the first fully integrated mobile app experience with Skybell.

IPVideo Corporation Enters OEM Partnership with Milestone Systems

IPVideo Corporation, a manufacturer of IP-based video surveillance and command center solutions, announced today that it has entered into an OEM (Original Equipment Manufacturer) agreement with Milestone Systems, by which IPVideo Corporation will sell and support a rebranded version of Milestone's XProtect software platform

Starting the Stroll

Today begins my stroll from booth to booth at ISC West. Truly, it is a gallop so I won't miss products that I have committed to view. Funny part about these tradeshows, there are some who call a week before the show wanting some booth time. Good idea, but not going to happen.



SRI Identity Introduces IOM Access Control Tablet to Converge Enterprise Security and Operations

SRI Identity, a line of business of SRI International, today introduced its IOM Access Control Tablet for mainstream access control applications.

WavestoreUSA Announces Technology Partnership with Blackbox USA covering Enhanced Evidence Protection

WavestoreUSA announces a technology partnership with Blackbox USA, which will be showcased during the 2016 ISC West Conference and Expo, April 6-8, at the Sands Expo Center in Las Vegas, NV.

The Biggest Data Leak in History

The Biggest Data Leak in History

The Panama Papers, recently leaked by an anonymous source, is the biggest data breach in history.

Schedule In these ISC West Events

We all know that ISC West is busy, busy so make sure you keep some time open in your schedule to hit these top events.

IoT At ISC

IoT At ISC

There going to be a ton of new products at this year’s ISC West show, especially internet driven devices.

Locked Down: Municipal Public Safety Departments See Benefits in Kinetic Mesh Wireless Networks

Kinetic Mesh’s secure, mobile network can aid law enforcement, surveillance efforts

Schools Must Be Vigilant in April

Schools Must Be Vigilant in April

Sensationalism drives increased risk of copycats

Trooper, Gunman Dead in Virginia Greyhound Shooting

Trooper, Gunman Dead in Virginia Greyhound Shooting

A Virginia Trooper was shot and killed in an incident at a Richmond Greyhound Station.

Going Behind the Scene

Passenger security can be a nightmare (Orlando, for example), but it’s nothing like the adventure your luggage will experience. In Quebec, luggage moves through six layers of security. One of the steps, if necessary, will be a manual search.

Launching Security into the Cyber World

Putting the cyber security world into perspective, and in tandem with the physical security side, takes a little know-how, elbow grease and brain power.

Following the Code

Following the Code

There are seven basic code categories for electrified hardware used to control access or egress, and each has seen recent code changes.

Dovetailing Cybersecurity into an IoT World

Dovetailing Cybersecurity into an IoT World

When it comes to cybersecurity the world falls into two camps: those focused on securing their hardware and applications as a closed system, and those who recognize that converging technologies calls for a more ecosystem-centric approach.

Coming of Age

Law enforcement, homeland security, surveillance, emergency response and military operations may span a range of operations, but they all share a crucial need for a detailed, real-time picture of rapidly changing events from various field locations.

Protecting Client Assets

Protecting Client Assets

TelX helps companies build more agile businesses faster with reduced infrastructure complexity and broader reach to new markets.

360-Degrees of Security

360-Degrees of Security

As a camera views and records in 360 degrees, a circular, distorted image is produced, making it essential to process the image so that the human eye can comprehend the image easily.

Featured

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.