Top Stories


Skimmers Getting More Difficult to Detect

Skimmers Getting More Difficult to Detect

Miniature devices planted on ATMs or at gas stations to steal credit and debit card data almost impossible to see.

Preventing Consumer Data Breaches with Electronic Access Control

Preventing Consumer Data Breaches with Electronic Access Control

As retail continues to expand the scope of its security administration to prepare for security breaches, IT managers must extend down to the rack level.

HID Global and ASSA ABLOY Help Secure 2014 FIFA World Cup

Companies’ products are used in six of 12 sites hosting World Cup matches as well as two other stadiums not selected for the world’s flagship football event.



ONVIF Releases Profile G for Video Storage and Recording

ONVIF Releases Profile G for Video Storage and Recording

Specification encompasses on-board video storage, searching, retrieval capabilities and media playback.

STANLEY Security Introduces Spring Stop Option

For use with STANLEY Commercial Hardware QDC100 Door Closer product line.

Tighter Security Measures Sought for Airline Safety

Tighter Security Measures Sought for Airline Safety

Intelligence officials concerned about new al-Qaida effort to create a bomb that would go through airport security undetected.

Obama’s Plans to Increase Border Security

Obama’s Plans to Increase Border Security

U.S. President to ask Congress to fund five specific actions to combat illegal migration into America.

Advanced Technology Video Announces New 700TVL IR Bullet Cameras

Designed for those looking for simple yet powerful, inexpensive cameras that provide superior quality images.

Costar Technologies, Inc. Completes Acquisition of CohuHD Camera Products Division

Costar Technologies, Inc. Completes Acquisition of CohuHD Camera Products Division

Acquisition expands product offerings and expected to accelerate sales growth.

Security Metrics Research Report Just Released

New metrics evaluation tool, metrics database and usage guidelines included to provide security practitioners with powerful resources to measure and demonstrate value of security functions.

Internet of Things - More Like Internet of Threats

Internet of Things - More Like Internet of Threats

In theory, IoT is a great concept; it all boils down to ease of use vs security. Which is more important?

Houston Astros Security Breach Revealed Inside Trade Data

Houston Astros Security Breach Revealed Inside Trade Data

Discussions concerning several players, including Jose Veras and Bud Norris, and other confidential data was hacked from "Ground Control."

Hybrid Credentials

There are three major initiatives for cards and credentials on college and healthcare campuses that every security director needs to be aware of

The Need for Enterprise Mobile Duress

The Need for Enterprise Mobile Duress

When most people think of school violence, they immediately think of school shootings. The media saturation that covers these shootings makes it unavoidable. however, school shootings are only the most extreme and rarest example of school violence.

Keeping Homes and Schools Safe in a Changing Environment

Keeping Homes and Schools Safe in a Changing Environment

Every 14.4 seconds—about the time it takes to rinse your hands—a home in the U.S. is burglarized. That means that during the roughly two minutes it takes to brush your teeth, eight homes have been robbed.

Video surveillance professionals capitalizing on America’s emerging energy boom

Drilling for Opportunity

The International Energy Agency predicts that America will overtake Saudi Arabia as the world’s leading oil producer by 2017 and be a net oil exporter by 2030.

A Day in the Life

Students, staff and instructors begin their day at a reasonable hour during a work day, but for security, time has no meaning.

Making the case - Providing confirmation of an actual intrusion

Making the Case

Beyond the added intelligence that verified alarms afford police officers when strategizing safer and more effective responses to real intrusion events, verification is also able to deliver practicality of another kind altogether: the minimization of false alarm dispatches.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.