Top Stories


Four People Injured in Campus Stabbing

Four People Injured in Campus Stabbing

Police investigate after suspect stabs four victims at the University of California, Merced.

Standoff with San Diego Gunman Ends after Five Hours

Standoff with San Diego Gunman Ends after Five Hours

Dozens of shots fired in an incident that shut down many blocks in a San Diego neighborhood and even delayed flights at the local airport.

Andrew Flood Joins Integrated Biometrics

Flood will work on Integrated Biometrics’ partner services infrastructure.



ONVIF Hosts 2015 Member Meeting

The company provided an update on activities and accomplishments over the years.

Fort Bend County Texas Chooses 3xLOGIC to Unify Access Control

Fort Bend County installs infinias Intelli-M slated to scale up to 1500 doors at multiple locations.

Research Finds 11 High-Impact Security Flaws on Galaxy S6 Edge

Research Finds 11 High-Impact Security Flaws on Galaxy S6 Edge

Google research team finds 11 security flaws on Android device.

U.S. Airports Missing Layers of Security

U.S. Airports Missing Layers of Security

A recent investigation shows U.S. airports are missing important security measures.

A Look at Sharm el Sheik Airport Security after Plane Crash

A Look at Sharm el Sheik Airport Security after Plane Crash

A look at the security of the airport in which Russia's deadliest aviation disaster departed from.

STANLEY Security Launches Veteran Recruiting Program

STANLEY partners with Wounded Warrior Project, Warriors to Work Program and Bradley-Morris, Inc. to employ former U.S. service members.

IT Security Compliance for Cloud Service Providers

KPMG and BalaBit have released the results of study involving IT service providers.

5 Products that Define the Next Generation of Home Security

5 Products that Define the Next Generation of Home Security

These technologies are changing the game when it comes to keeping you safe and giving you peace of mind.

Taking a Practical Look at Video Storage in the Cloud

Taking a Practical Look at Video Storage in the Cloud

VSaaS solutions have been around for a while now, offering what many see as more efficient software maintenance and support for their surveillance systems.

Majority of Retailers are not using the New Credit Card Technology

Majority of Retailers are not using the New Credit Card Technology

Retailers are deciding not to change over to credit card chip transactions until after the holiday season.

With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.

7 Tips for CEOs Looking to Boost Their Cybersecurity Knowledge

With 90 percent of companies admitting they’ve suffered at least one cyberattack, sitting back and avoiding the topic is not a suitable solution or strategy for CEOs hoping to keep their technology — not to mention their customers’ information — safe.

Catching the Thugs - The San Diego Unified School District’s previous video surveillance solution presented a number of problems. It required two management servers in which most settings had to be replicated between the two, which was awkward and cumbersome.

Catching the Thugs

The San Diego Unified School District’s previous video surveillance solution presented a number of problems. It required two management servers in which most settings had to be replicated between the two, which was awkward and cumbersome.

Seamless Integration - Designed to a be a state-of-theart facility for students and faculty members at Oregon State University, Austin Hall could represent one of the most unique systems integration projects within the higher education market in the United States.

Seamless Integration

Designed to a be a state-of-theart facility for students and faculty members at Oregon State University, Austin Hall could represent one of the most unique systems integration projects within the higher education market in the United States.

Define New Models - Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.

Define New Models

Now is an exciting time to be in the business of security integration. The quality of surveillance images are getting better in a variety of configurations ranging from megapixels to multisensor panoramic to thermal imaging cameras.

Persistent Threats

A layered approach to network security is the most reliable way of ensuring peace of mind against Advanced Persistent Threat (APT) forms of cyberattacks because no modern company can afford the surefire method of protection

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.