Top Stories


New Business Opportunities

Security is more than just the protection of people, companies and their assets; it also is an integral part of a company’s reputation and success.

Verint Launches its Road to Certification Technical Training Roadshows System

May 15-18 Verint’s “Road to Certification” roadshows are designed for system integrators who manage, utilize or support the Nextiva VMS platform.

RSA Conference Announces Recipients of 15th Annual Award Program

RSA Conference, the world’s leading information security conferences and expositions, recently announced the honorees of its 15th annual awards program.



Diamond in the Rough

Though the thief stole thousands of dollars worth of jewelry, the Calderons were just thankful to be alive.

Tap Into Security Remotely

Organizations whose operations span cities, countries and even continents face formidable challenges in their efforts to secure people, property and assets.

What The Glock

Come and listen to the story of an Austrian named Glock, He and wife, Helga, made curtain rods in their shop, Then one day he invented a new handgun, And the Austrian army said, “We gotz to have us one.” Glock, that is. Lightweight. Model 17. Well, the first thing you know ol’ Glock’s a billionaire, Kinfolk said, “Gast’, export it away from there!” Said, “USA is the place it oughta be.” So he marketed it abroad to frontline security. The police, that is—needing new fire power.

Securing the Global Trade Market

Advances in communication technology, trade barriers and production cost reductions have furthered global capital markets and provided new economic opportunities.

Growth in SaaS, Mobile Applications Increases Requirement for Software Security Testing at Scale

Veracode Inc. recently announced the availability of a whitepaper, ‘Outsourcing the problem of software security’, produced by primary research and analysis company, Quocirca.

Alarm Protocol

Many people—even within the security industry—may be surprised to learn how traditional alarm dispatches work. It can be a lengthy process.

Study: Encryption Critical to Increase Security Posture

Thales, provider of information systems and communications security, recently announced the publication of the 2011 Global Encryption Trends Study.

Upgrading To A New Era

In order to allow an all-IP-based services platform, service providers are upgrading existing networks and migration strategies.

Cloud Security Alliance Launches Mobile, Innovation Initiatives

The Cloud Security Alliance (CSA) recently announced two significant new initiatives for 2012, addressing growing areas of need in cloud security -- mobile computing and innovation.

HID Global Demonstrates First Single-Provider Solution for Physical-Logical Access

HID Global recently announced its highly-integrated fraud detection service from its Identity Assurance business, ActivIdentity.

Sophisticated and Strategic

Mission-critical facilities such as data and telecommunications centers must maintain operations without interruption.

Eyes Wide Open

The Port of Portland services more than 800 vessel calls each year, accounting for more than 14 million tons of ocean-going cargo.

Anything But Old School

Among Austin Independent School District’s top-stated values are excellence and the health and safety of its students, and it shows.

Charity Organization Awards Security Companies for Humanitarian Contributions

Mission 500, a charitable organization engaging security professionals to sponsor needy children through the World Vision organization, recently announced the winners of its annual Humanitarian and Corporate Social Responsibility (CSR) awards. The awards are designed to honor companies in the security industry who make important contributions to those in need.

Featured

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.