Top Stories


Three-strikes Law Fails to Reduce Crime in California

California’s three-strikes law has not reduced violent crime, but has contributed significantly to the state’s financial woes by substantially increasing the prison population, according to a University of California, Riverside researcher.

Survey Highlights Webmasters' Struggles with Hacked Sites

StopBadware and Commtouch recently published a joint report titled "Compromised Websites: An Owner's Perspective" that chronicles webmasters' experiences with hacked websites. The report presents statistics and opinions on how site owners navigate the process of learning their sites have been hacked and repairing the damage.

NQ Mobile

Report Identifies Top Three Malware Threats for 2012

A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.



Damballa Discovers Advanced Evasion Techniques Being Used by Six Crimeware Families

Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.

Unintentional Exposure of Corporate Data Through Theft, Loss of Removable Devices Examined in Survey

Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.

Alta dt Data Technologies

IntervalZero and Alta Data Technologies Form Avionics Partnership

The partnership will allow customers to easily develop real-time MIL-STD-1553 and ARINC applications for Windows platforms.

Registration Now Open for ESX 2012 in Nashville

Security industry members anxious to attend the 2012 Electronic Security Expo (ESX) event in Nashville, Tenn., now have the opportunity to lock-in early bird rates. Members of the industry can register here for the event, being held June 25-29.

Shawnee County Department of Corrections Deploys High-Definition Surveillance System

The Shawnee County Department of Corrections (SNDOC) in Topeka, Kan., deployed a new high-definition surveillance system to heighten security, expedite investigations, and ultimately, improve inmate behavior.

White Paper Examines Certificate Management Challenges and Entrust

With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.

Identity Fraud Rose in 2011

The 2012 Javelin Strategy & Research Identity Fraud Report shows that the number of identity fraud incidents increased by 13 percent in 2011, totaling 11.6 million adult victims. The report also found that certain social media behaviors and increasing number of data breach incidents contributed to the overall amount of identity fraud instances in the United States over the past year.

DHS and The Netherlands Sign Cybersecurity Agreement

Secretary of Homeland Security Janet Napolitano, Dutch Minister of Security and Justice Ivo Opstelten recently signed a Letter of Intent to build upon cooperative cybersecurity initiatives to promote a safe, secure and resilient cyber environment.

Milestone Announces Partner Achievements

It’s always a pleasure to attend the Milestone Integration Platform Symposium, and is an eye-opening experience to see what’s happening in the networked world.

Skechers Secures Flagship Distribution Facility with IP Surveillance

Skechers footwear will secure its new $250 million, flagship distribution facility in Rancho Belago, Calif. with American Dynamics video surveillance solution.

Using Advanced Security Technology to Comply with the Food Safety Modernization Act

Last year, the Food Safety Modernization Act (FSMA), was implemented to prevent food-borne disease caused by both intentional and unintentional sources, and to improve detection and response when an outbreak occurs.

DHS Announces Grant Guidance for Fiscal Year 2012 Preparedness Grants

DHS Secretary of Homeland Security Janet Napolitano recently announced the release of FY 2012 grant guidance and application kits for seven DHS preparedness grant programs totaling over $1.3 billion.

Anthrax Killing Foam Proves Effective in Meth Lab Cleanup

Sandia’s decontamination foam, developed more than a decade ago and used to decontaminate federal office buildings and mailrooms during the 2001 anthrax attacks, is now being used to decontaminate illegal methamphetamine labs.

Featured

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.