Top Stories


RFID to be Worth More Than $70 Billion Across Next Five Years, According to Research

The market for RFID transponders, readers, software, and services will generate $70.5 billion from 2012 to the end of 2017.

Research: Personal Information Top Target of Cyber Attacks

Customer, student, employee and patient information is most at risk for cyber attacks today, and defending that data is a top concern for IT professionals this year, according to the Data Loss Straw Poll, a national survey published today by CDW LLC.

HID Global Receives Additional Order For U.S. Green Cards

HID Global recently announced that the company has received a follow-on order for the manufacture and supply of U.S. government Permanent Resident Cards, also known as “Green Cards,” issued to all legal foreign residents of the United States under the U.S. Citizenship and Immigration Services (USCIS) border security program.



The Business of Branding

As any fan of Coca-Cola, Nike, Google or Apple knows, a strong brand presence can work wonders for a company. As a home security dealer, the right approach to branding can help you grow your business with both new leads and referrals. All it takes is a commitment to leverage your brand, clearly and consistently, as much as possible.

UK Airport Deploys IndigoVision IP Video Surveillance

IndigoVision’s end-to-end IP Video surveillance system has been installed at East Midlands Airport, providing the business with more detailed analysis and greater storage of video surveillance footage.

Analysis of 15 Failed Terrorist Plots Against Surface Transportation Provides Insight into Tactics, Weapons

The Mineta Transportation Institute has released its newest research report, Carnage Interrupted: An Analysis of Fifteen Terrorist Plots Against Public Surface Transportation, which examines several factors in 13 plots that authorities uncovered and foiled before attacks could be carried out.

Report: Criminal Background Screenings Often Full of Errors

Since September 11, 2001, there's been an explosion in criminal background checks for job applicants by employers, yet many reports are riddled with errors.

Denver Transportation District Expanding Video Security

NICE recently announced that the Denver Regional Transportation District (RTD), the public transit system for greater metro Denver, is expanding its implementation of NICE video security solutions to the West Rail Line, Union Station and the Denver Civic Center.

TSA Selects MorphoTrust USA For Universal Enrollment Service

The Transportation Security Administration (TSA) has selected MorphoTrust USA as the prime contractor for its new Universal Enrollment Service (UES), which will transition multiple programs into a consolidated service with convenient locations for individuals requiring enrollment and registration for programs serviced by TSA.

Scrap Metal Facility Deploys Cameras To Curb Theft, Streamline Management

MOBOTIX, a provider of high-resolution, network-based security solutions, recently announced that United Scrap, a metal buying and recycling facility, has deployed a complete MOBOTIX surveillance solution at its 35-acre facility near Chicago.

ASIS Releases New ANSI Standard

ASIS International recently released its Organizational Resilience Maturity Model American National Standard, which provides guidance for the implementation of the ANSI/ASIS SPC.1-2009 organizational resilience (OR) standard in six phases, ranging from an unplanned approach, to managing events, to going beyond the requirements of the OR standard and creating a holistic environment for resilience management. By adopting a phased implementation process, organizations can determine how much risk is acceptable and how to cost-effectively manage the uncertainty in achieving its objectives.

Tips Guard Against Phishing, Malware Attacks During Tax Season

AppRiver LLC, a provider of email messaging and Web security solutions, today released its latest Threat and Spamscape report as well as a new video offering taxpayers advice on how to safeguard against cyber scams while filing taxes online.

Automated Computer System Identifies Liars 82.5 Percent of the Time

Inspired by the work of psychologists who study the human face for clues that someone is telling a high-stakes lie, University of Buffalo computer scientists are exploring whether machines can also read the visual cues that give away deceit.

Alabama Zoo Uses MOBOTIX Surveillance Technology

MOBOTIX, a provider of high-resolution, network-based security solutions, recently announced the Birmingham Zoo has deployed MOBOTIX high-resolution cameras throughout its facility, including high-traffic areas and point-of-sale locations.

Florida Prep School Deploys Pivot3 Appliances

Pivot3 Inc., provider of storage and compute appliances, recently announced that Pine Crest School has deployed Pivot3 appliances to store captured video images and host its video management system.

ISC West Session Tackles How To Work with IT Managers

While physical security professionals continue to migrate tools to the IP network, a session at ISC West last week -- "IT Manager: Friend or Foe?" -- tackled how to work with IT personnel to make the transition easier.

Arecont Vision Showcases True Wide Dynamic Range Megapixel Cameras

Arecont Vision announces a new selection of Wide Dynamic Range (WDR) cameras that can provide clear images in extreme light conditions containing both very bright and dark areas in the field of view.

Vummi Introduces New Family of Long-Range Surveillance Cameras

Vumii Imaging Inc., a developer and manufacturer of thermal and near-infrared illumination cameras, announced the introduction of its Accuracii long range video surveillance system family.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.