Top Stories


Advanced Considerations - Employee mustering at industrial sites or large facilities has typically been difficult to efficiently manage due to the complexity of the situation and human factors.

Advanced Considerations

Employee mustering at industrial sites or large facilities has typically been difficult to efficiently manage due to the complexity of the situation and human factors.

Privacy Extortion - This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.

Privacy Extortion

This privacy sensitivity occurred innocently in the physical world on a beautiful avenue. But, privacy sensitivity can be even more critical in the virtual world.

Bridging the Great Divide - More than a decade ago, the talk was all about convergence. Well, the industry has converged, but there is now something more interesting on the horizon.

Bridging the Great Divide

More than a decade ago, the talk was all about convergence. Well, the industry has converged, but there is now something more interesting on the horizon.



One Touch Alarm - According to several studies, growth is now focused on “self-installed” products that piggyback on the popularity of smart phones and the tech-savvy millennials that use these devices for everything from banking to prepared food delivery.

One Touch Alarm

According to several studies, growth is now focused on “self-installed” products that piggyback on the popularity of smart phones and the tech-savvy millennials that use these devices for everything from banking to prepared food delivery.

Tight as a Drum - Imagine getting slapped with a $1 million fine for not adequately securing your facility. Think it can’t happen? Think again.

Tight as a Drum

Imagine getting slapped with a $1 million fine for not adequately securing your facility. Think it can’t happen? Think again.

New Strategies - As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches.

New Strategies

As IT security professionals, we’re great at providing our clients with firewalls, encryption software and other technological safeguards against data breaches. But, did you know that even your best-protected clients may face an even greater threat than poorly managed networks and systems?

Police Release Surveillance Video of Twin Peaks Shootout

Police Release Surveillance Video of Twin Peaks Shootout

Waco PD releases the video from inside the restaurant and patio on the day of the shootout that left 9 dead.

Schneider Electric Appoints New CEO for Pelco

Sharad Shekhar has been named the newest CEO for Pelco by Schneider Electric.

Breeder’s Cup Aims for Cocoon of Safety

Breeder's Cup Aims for Cocoon of Safety

Study Shows Employees are Putting Their Companies at Risk

Study Shows Employees are Putting Their Companies at Risk

Poor security habits from employees could lead to a cybersecurity breach.

Will-Burt Company Security System Earns Top Honors

Company's security system placed on GSA Approved Products List 2.

SureView Systems Announces New Partnership with Access Technologies

SureView Systems partners with integration firm to create easy-to-use platform for customers.

Cisco Joins with Lancope to Gain Greater Network Security

Cisco Joins with Lancope to Gain Greater Network Security

Cisco's acquisition of Lancope predicted to boost Cisco’s cybersecurity threat defense capabilities.

U.S. Security Associates Acquires UK Based Entourage Security Management

USA affiliate Andrews International acquires Entourage Security Management as a way to expand overseas.

Officer on Leave after Controversial Arrest of a Student

Officer on Leave after Controversial Arrest of a Student

An officer is under investigation after the violent arrest of a high school student.

Campus Security Says NJCU Employee Robbed by Juveniles

A campus security email said that a New Jersey City University staff member has his wallet stolen by three juveniles.

Tragedy Strikes at College Homecoming Parade

Tragedy Strikes at College Homecoming Parade

Four dead and many more injured after a car crashes into parade audience.

Texas Border School District Upgrades Security from Analog to IP

Milestone Systems' open platform IP video management software (VMS) is the flexible foundation for continuing expansion by the Mission Consolidated Independent School District (Mission CISD) in South Texas.

Featured

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.