Top Stories


USC Student Death Prompts Security Upgrades

USC Student Death Prompts Security Upgrades

Safety includes safety practices and methods and people being aware of their surroundings.

Security Holes Found in some DLP Products

Security Holes Found in some DLP Products

Two researchers planned to reveal their findings at Black Hat USA.

Speco Technologies Brings Award Winning Intensifier Technology to IP

Cameras display color images at night in HD without IR LEDs.



College Deploys Latest SILENT KNIGHT Technologies in Renown Fire Engineering Program

Complete and fully-functional Silent Knight Fire Alarm and Emergency Communication System serves critical training role in Delaware Tech Fire Engineering Lab.

New Samsung Heat-map Analytic Solution Improves Retail Operations and Customer Service

Analyzes movement in a scene to provide a graphical representation of the areas where the most activity occurred.

Taking HD Video Surveillance to the Extremes

Bosch MIC IP 7000 HD family goes IP, captures relevant details in the harshest environments 24/.

Voltage SecureData z/Protect Provides Reliable, Standards-based Protection

Breakthrough encryption and tokenization technologies deliver a new level of safety in today’s risk-prone, online transactional world.

Homeless Woman at San Jose Airport Boards Plane without a Ticket

Homeless Woman at San Jose Airport Boards Plane without a Ticket

Airport responded that the stowaway posed no security threat because she passed TSA screening.

U.S. Homeland Security Contractor Acknowledges Computer Breach

US Homeland Security Contractor Acknowledges Computer Breach

The company says it has all the markings of a state-sponsored attack.

Facebook Follows its Users across Cyberspace

Facebook Follows its Users across Cyberspace

4 ways to battle this social media giant to beat them at their own game.

Hackers steal 1.2 billion Usernames and Passwords

Hackers Steal 1.2 Billion Usernames and Passwords

Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.

Making a Cultural Shift

Making a Cultural Shift

Hospitals operate 24/7. As a result, countless numbers of people enter and exit their facilities. In order to provide a safe environment for their patients and employees, they need to know who these people are and why they are there.

Quantum Secure Debuts SAFE for Secure Cloud

SaaS solution makes SAFE accessible to SMB users and resellers.

Allegion to Feature New ENGAGE Technology-enabled Schlage Wireless Electronic Locks at ASHE

Allows healthcare organizations to easily migrate from mechanical locks to electronic access control.

Proximex Delivers Surveillint Essentials

This fast deploying, PSIM value solution helps customers to easily integrate and monitor their entire security environment.

LENSEC to Demonstrate Perspective VMS at ASIS 2014

LENSEC representatives will show new features of Perspective Video Management Software.

Google Turns in Man with Child Porn

Google Turns in Man with Child Porn

The internet company found illegal images in his Gmail account.

Application Single Sign-on – Benefits and Considerations

Application Single Sign-on – Benefits and Considerations

Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.

Featured

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.