Top Stories


JFK Airport Perimeter Breached by Kayakers

JFK Airport Perimeter Breached by Kayakers

After millions of dollars spent on perimeter security, no alarm sounded and two men were found.

Mystic Aquarium Ups Their Security with Keri Systems

Because it is a public facility that houses a significant and valuable marine life population, Mystic Aquarium was in need of more sophisticated control of access than traditional methods.

EU Google, Microsoft and Yahoo Meet on

EU, Google, Microsoft and Yahoo Meet on 'Right to be Forgotten'

Questions still remain about the implementation and effectiveness of this rule.



Viscount Awarded New Contracts for US Department of Homeland Security

Company secures U.S. Federal Government facilities in Missouri and Massachusetts.

FST Biometrics Receives Lenel Factory Certification Under Lenel's OpenAccess Alliance Program

FST Biometrics' In Motion Identification (IMID) software interfaces with the Lenel OnGuard access control security system.

The Ultimate Cybersecurity Fix

The Ultimate Cybersecurity Fix

Typewriter sales in German economy boom as tool to thwart cyber spying.

S2 Security Strengthens Channel Partner Support

Expanded S2 Channel Partner Program to accelerate partner business growth.

PPM Certifies Its Incident Management Integration

Now a member of AMAG Technology's Symmetry Extended Business Solutions (EBS) Program.

Kwikset Kevo’s Latest Upgrade Introduces Free Unlimited Guest eKeys

Home access management becomes even more convenient for current and future Kevo owners; gives guests 24-hour access to the home, and sets day and time constraints.

OnSSI Receives Lenel Factory Certification Under OpenAccess Alliance Program

OnSSI’s Ocularis v3.8 approved for use with Lenel’s OnGuard Access Control Security System.

Home Security Systems Can Be Used to Spy on You

Home Security Systems Can Be Used to Spy on You

Cybersecurity researcher exploits home security for the sake of safety.

Help TSA Fix Airport Security Lines

Help TSA Fix Airport Security Lines

Someone could take home a $15,000 award just for helping to solve the traveler traffic issue at airports.

SecureNet Simplifies Payment Integration with Launch of Single Stack of APIs

Enhancements give developers access to a single stack of development-language-agnostic APIs for both card-present and card-not-present transactions, allowing for easier integration across all channels.

Mission 500 Partners with ESA Gives Back at ESX 2014 in Nashville

Over $10,000 was raised for children in need.

StubHub the Victim of Cyber Fraud

StubHub the Victim of Cyber Fraud

Authorities to announce the who they arrested and the number people victimized.

G4S Technology Awarded Contract to Upgrade Airport

$1.8 million dollar contract awarded to upgrade Killeen-Fort Hood airport.

Panopticon Captures Every Movement in 3D

Panopticon Captures Every Movement in 3D

Huge sphere of video cameras track movements of people and objects in the center of the dome.

White Flags Fly from Brooklyn Bridge in Security Breach

White Flags Fly from Brooklyn Bridge in Security Breach

The American flags that sit atop the bridge were replaced by white flags.

Featured

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.