Top Stories


The New Alphabet

Mastering the alphabet used to be as simple as learning your ABCs. Not anymore. A whole new alphabet has been created for the world of analog video. Don’t try to sing this one to the “Alphabet song” we all grew up with. It doesn’t work. Trust me. I just spent 15 minutes trying.

Too Good to be True

There has been a noticeable increase in mass-produced, lowcost cameras available in the security industry. Low prices can be hard to resist, especially considering the tight budgets faced by government agencies at all levels.

Trendy Beverly Hills

Trendy Beverly Hills

Beverly Hills, Calif., has been glamorized in countless film and television depictions as the home of the wealthy and the famous.



Changes are Coming

Changes are Coming

During the past 10 years there have been some magnificent technological innovations in the security industry, but the pace of change has never been higher.

Appropriate Response

Appropriate Response

Everybody knows the old saying that the only things certain in life are death and taxes. But, alarm dealers understand that there’s a third certainty: false alarms.

Capturing Teachable Moments

Capturing Teachable Moments

When you’re conducting a therapy session, it’s virtually impossible to be fully engaged with the client and be an objective observer of your own interactions at the same time.

The Zoo at Night

The Zoo at Night

The fierce competition in the hospitality market has created a need to think creatively in order to increase the number of visitors. Therefore, Copenhagen Zoo constantly looks for new ways to give their customers an interesting and out-of-the-box experience.

Building a Foundation

Building a Foundation

Now more than ever, major network vulnerabilities are making national and international news headlines.

More Comfortable Operations

Throughout the world, security and screening for explosives is a vital service for numerous types of businesses and organizations—from package transport to government agencies and to financial institutions.

Technologies Drive Interagency Collaboration

Technologies Drive Interagency Collaboration

Cities are a challenge to secure and manage—they encompass a wide geographic footprint and include a multitude of key stakeholders comprising local, state and federal agencies along with a variety of private business entities and public organizations.

Collaboration is Key in the Video Vortex

Increased security concerns, availability of IP networks, camera sprawl and improvement in video content analytics are all contributing to a rapid growth in the amount of video surveillance data that federal agencies are gathering today.

A Strategic Approach

A Strategic Approach

The security industry is under attack by buzzwords, and the Internet of Things (IoT) is one of a few leading the assault.

How Cyber Secure Are Your Physical Security Devices

How Cyber Secure Are Your Physical Security Devices?

Are your physical security devices attached to the same network as your sensitive business data?

Connecting Disparate Systems

NERC compliance requirements in the utilities industry have made it essential to monitor and report on physical access to various facilities, control rooms, substations and critical assets.

How Secure are Your Devices?

Whenever I receive a cover story from Vince Ricco I listen, and I learn. I’ve known Vince for quite a while, and when he asks if your security devices are connected to your sensitive business data, it really makes you think.

Hearing Security Solutions

Hearing Security Solutions

Audio is a vital component in the security industry. For years, companies have focused on video, trying to perfect image capture, data storage and analytics.

Should Nuclear Missiles be on High Alert

Should Nuclear Missiles be on 'High Alert?'

Hopefully, hackers have heart not to launch nuclear weapons.

Proposed Security Guard Training Measure Delayed Again

Proposed Security Guard Training Measure Delayed Again

The measure, from the Pittsburgh City Council, would require security companies that guard large buildings to put their employees through a city-approved training program.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.