Top Stories


Technology at Your Fingertips

By year’s end we have seen tons of new products and technology, and it amazes me that there is even more on the horizon.

Why Multi-Sensor Megapixel Cameras Work - Today’s hot technology has traveled quite a distance to reach the digital world

Why Multi-Sensor Megapixel Cameras Work

Video surveillance technology has come a long way from the days when analog CCTV cameras dominated the market.

My New Friends - Tradeshows provide many different opportunities

My New Friends

Providing security for a house of worship wasn’t on my radar until recently. Dylann Roof changed all that when he opened fire on the Emanuel African Methodist Episcopal Church in downtown Charleston, S.C.



Managing Risks - Security efforts are now defined to protect critical infrastructure

Managing Risks

Traditionally, electrical substation security was aimed only at preventing access to stop vandalism and improve safety. Today, however, security efforts have been redefined to address new threats in order to protect critical infrastructure.

What's Trending

The video surveillance and physical security industry has been anything but quiet recently. Consolidation via merger and acquisition activity, competitive pressures driving costs lower and technology evolution are forces affecting trends both now and into the future.

Deadly Response - Early detection and remote response might have de-escalated police incident at Texas car dealership

Deadly Response

Car dealerships present a complex security challenge because they stock high-end models for the public to see, placing high-value assets out in the open where theft and damage can occur.

Making Technology Accessible - Industry responds to demand for sustainable access control products and technologies

Making Technology Accessible

When I’m asked what role access control devices and technologies play in a structure’s overall sustainability, my thoughts usually wander first to LED lighting.

Global Expansion

For the highest level of security possible, Paramount chose to invest in enterprise command center software (ECCS) by SureView Systems to consolidate all of its security and life safety systems across the globe in a simple, effective and centrally manageable security management solution.

Total Recall Celebrates 30 Years

Total Recall is the video surveillance integrator for the Statue of Liberty

France Introduces Massive Security Measures for Climate Summit

France Introduces Massive Security Measures for Climate Summit

France ensures the safety of world leaders arriving in Paris for the COP21.

3 Killed in Colorado Health Clinic Shooting

3 Killed in Colorado Health Clinic Shooting

A shooting at a Colorado Springs Planned Parenthood leaves three dead and nine wounded.

FLIR Acquires DVTEL for $92 Million

FLIR Systems, Inc. announced today that it has acquired DVTEL, Inc., a provider of software and hardware technologies for advanced video surveillance, for approximately $92 million in cash.

State Department Issues Worldwide Travel Alert

State Department Issues Worldwide Travel Alert

The U.S. has issued a worldwide travel alert for Americans amid concerns that terror groups and individuals plan more attacks after the Paris massacres.

IQ Certification Chooses New Board Member

Kathleen Schraufnagel, Industry Liaison for Monitronics was chosen as the newest member to join the IQ Certification Board.

Airports Expected to See Increase in Thanksgiving Travelers and Security

Airports Expected to See Increase in Thanksgiving Travelers and Security

Airports’ busiest travel days of the year are likely to become even more complicated for travelers flying through U.S. airports this Thanksgiving Holiday.

STANLEY Security and I-View Announce Partnership

STANLEY Security and I-View announce their partnership for live, actionable verified alarm response system.

5 Steps to Derail an Attack on a Soft Target

5 Steps to Derail an Attack on a Soft Target

Minneapolis police put together a guide to recognizing an attack before it happens.

The Next Generation of Security and Bag Check

The Next Generation of Security and Bag Check

We may have finally found a more efficient way of getting through airport security.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.