Top Stories


Work App Tracked Woman

Work App Tracked Woman's Movements 24/7

Likened app to a prisoner’s ankle bracelet, informing boss his actions are illegal.

Hackers Have Figured Out How to Steal from Starbucks Cards

Hackers Have Figured Out How to Steal from Starbucks Cards

Users who have auto-reload setup on their digital card might be vulnerable.

Security System Sprays Intruders with Synthetic DNA

Security System Sprays Intruders with Synthetic DNA

Subway restaurants taking a stand against robbery and crime.



Four Important Things You Need to Know about Hi-PoE

Online Exclusive: Four Important Things You Need to Know about Hi-PoE

Seemingly limitless system applications allows manufacturers to significantly increase capabilities of cameras and other devices.

Baseball security

MLB Increases Baseball Security after Deflategate

The league is beefing up security for the balls.

Code Blue Partners with AMID Strategies

Strategies to bolster relationships with A&E specifiers.

New Ocularis v5.0 Video Management Software Now Available for Delivery

Innovative technology platform delivers power, affordability and independence.

Bosch Security Systems Opens New Distribution Center in South Carolina

New site will receive, store and ship more than 50,000 different video surveillance, intrusion and fire detection, access control and management systems and audio and conference systems products.

Triplett Announces New Digital MultiMeters

Low cost, feature rich with large backlit displays.

Hikvision Meets with Legislators for ESAs Day on Capitol Hill

Discussion of important issues affecting the security industry: apprenticeship programs, school security and telecommunications.

Mission 500 Sponsors an Additional 127 Children in Mexico

Approximately 700 children now sponsored in Mexico.

AMAG Technology Introduces Symmetry CONNECT

Policy-based platform providing safety, security and risk management capabilities for organizations demanding a process and policy-based approach to managing enterprise security functions.

Gun Debate Pits TSA and Airport Police Against Each Other

Gun Debate Pits TSA and Airport Police Against Each Other

To arm or not to arm, that is the question.

White House Fence gets Spikes for Security

White House Fence gets Spikes for Security

Secret Service hopes to deter and inhibit people from climbing over the fence.

Genetec Stratocast Partners with Digicel Group

Offers cloud-based video surveillance to businesses across the Caribbean.

ISCON Imaging Aligns Focus

Driving new levels of operational and workplace safety and loss prevention.

Smart Payment Association Releases Total Market Estimate 2014 Figures

Close to half of cards featured contactless payment capability.

SureView Systems Honored with Government Security Award

Immix platform recognized as Platinum-level winner.

HID Global and Botosoft Launch Mobile Student ID System in West Africa

Mobile Student ID system helps WAEC combat identity fraud and preserve the value of an education in Nigeria.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3