Top Stories


Raytheon Awarded $53 Million to Advance Dual Band Radar Development

Raytheon Company has been awarded two U.S. Navy contracts for the Dual Band Radar, the multimission air defense radar for the future USS Gerald R. Ford (CVN 78), America's next-generation aircraft carrier.

New Fire Protection Essential

Texas Children’s Hospital recently added a new high-rise facility, the Pavilion for Women, to its already impressive five-building campus in the heart of the Texas Medical Center in Houston.

Be Prepared in Case of Disaster

When severe tornadoes struck six Southern states in April 2011, the ensuing crisis tested the mettle of emergency responders



Peace of Mind

We have all heard of “tightening the belt” in tough economic times, but few can relate as well as the multitude of private, not-for-profit organizations that rely on public and private donations and grants for their annual budget.

Dissecting The Layers

When people talk about layered physical security, they often think it involves having more than one security device at a particular point on their property.

Circle The Wagons

As the first line of defense, perimeter security is often the initial focus: physical barriers, deterrent strategies, access control and intrusion detection systems, ground sensors and street patrols.

Providing Security

IP technology makes it easier to secure a campus environment. This is true even for very large corporate, healthcare and education campuses where many points of security concern are spread across large geographic areas.

Increased Card Security

Protecting the physical integrity of personal and corporate information is an important task for Banco do Nordeste do Brazil (BNB), which goes above and beyond the security rules established by the Central Bank of Brazil to adopt additional security measures.

Safer More Secure Campuses

To enhance the quality of the educational experience as well as the safety of their students, many schools and universities today view campus safety as a top priority.

Study: Conciliatory Tactics More Effective Than Punishment in Reducing Terrorism

Policies that reward abstinence from terrorism are more successful in reducing such acts of violence than tactics that aim to punish terrorists, suggests a new study in the August issue of the American Sociological Review.

Boosting Identity

Today, decision makers can raise the bar on enterprise security without raising the complexity for their users.

Cell Phone Financial Identity Theft

USA Today reported in March 2012 that Americans lost $30 billion worth of mobile phones last year.

Cost-Effective Compliance

The FBI established the Criminal Justice Information Services (CJIS) division in 1992, and it is now the bureau’s largest division.

Curbside Security

Of all the accoutrements of civilization—and they are myriad, from plumbing to Pop- Tarts—perhaps none is more routinely taken for granted than the lowly fire hydrant.

From the IT Perspective

Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.

Historic Theater Add System Sensor Fire Detector

In 2010, the historic Egyptian Theatre in DeKalb, Ill., decided to upgrade to a more modern and effective life safety system to protect the structure and its patrons.

Todays Threat Landscape

Cyberthieves and hackers are always looking for new ways to obtain sensitive information. As Web browsers have become the common interface for accessing information that drives business activity, browsers have become the primary target of theft and data leakage.

Video Provision

After recommending strategies for on-the-border video cameras and other security technologies, Rep. Candice Miller (R-MI) and her colleagues in the U.S. House of Representatives have passed H.R. 1299, known as the Secure Border Act.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.