Top Stories


Border Patrol Rescues 2 Abandoned Children

U.S. Border Patrol agents rescued two children who had been abandoned along the border near Jacumba Monday afternoon.

Panasonic i-PRO Partners with Genetec on New Cloud-Based Digital Evidence Management System

Panasonic i-PRO Sensing Solutions Corporation of America is partnering with Genetec Inc. to offer a cloud-based digital evidence management system for law enforcement customers.

Carson and dormakaba Announce Integration to Expand SMART Multifamily Security Solutions

Carson, creator of the One-App Resident ExperienceTM and 24/7 remote doorman service for multifamily properties, and dormakaba have announced an integration and distribution partnership.



XTEND Delivers Counter-Drone Systems to Department of Defense Office

XTEND is providing counter-unmanned aircraft system (C-UAS) technologies for U.S. military and defense entities.

Gallagher Named Vice President at Group 337

Group337 have announced the appointment of Hilary Gallagher as vice president, responsible for internal and external marketing, communication, branding and content creation.

Lessons Learned from Oldsmar Water Plant Hack

Lessons Learned from Oldsmar Water Plant Hack

Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.

Car Rams Barricade at U.S. Capitol, Kills Officer

A car rammed into two Capitol Police officers at a barricade outside the U.S. Capitol building in Washington, D.C., on Friday afternoon. According to AP News, one of the officers was killed, another was injured, and the driver of the vehicle was shot and killed.

Protecting Critical Infrastructure

Virtually every U.S. citizen counts on the nation’s critical infrastructure for services and products that touch their lives daily.

Steering the Conversation

Steering the Conversation

When navigating the Smart City market, it is wise to speak to the priorities and concerns of diverse stakeholders, many of whom might lie outside the security integrator’s traditional business.

A Capitol Breach

A Capitol Breach

On Jan. 6, the U.S. Capitol security perimeter was breached and the nation watched as multiple levels of security failed.

Actionable Intelligence

There is no doubt that Artificial Intelligence (AI) is here to stay, as new AI-driven solutions are pervasive across every category of professional and consumer electronics today.

Going Beyond Retail

Going Beyond Retail

Physical security infrastructure has traditionally been seen as a sunk cost; an expense that represents a cost of doing business.

A Sound Strategy

A Sound Strategy

No matter the security criticality of your facility or the sophistication of your security system, simple key control is a foundational process of physical key management that helps control access to crucial assets, people, information and spaces.

Running the Gauntlet

Running the Gauntlet

Not long ago when visiting a colleague’s office, it was protocol to arrive early to run the gauntlet of the visitor management check-in that awaited, a process that might gladly be endured now if just for a brief return to some normalcy.

The Bottom Line

The Bottom Line

Last year brought tremendous challenges for everyone, especially retailers. Retail shrinkage, the reduction of inventory from shoplifting, fraud and internal theft, is estimated to have cost the industry $61.7 billion according to a 2020 National Retail Security Survey, an all-time high.

A Healthier Facility

Amid the health, economic, natural, and social crises we’ve experienced in the past year, the critical role that security plays in creating safe and healthy environments is more apparent than ever.

The Impact of Coronavirus

The Impact of Coronavirus

The pandemic compelled hospitals to increase safety and security measures. The role of the security professional has been redefined and prioritized to support more patient care related activities.

Absolute Capitol Security

Here we go again, but this time security is prepared at the Capitol. Apparently, the chatter among extremists groups have been talking about possible plots of illicit activity in Washington, D.C.

Current and future uses in the commercial security industry

On a Cloud of its Own

Cloud-based technology and solutions have become more and more mainstream, especially in the commercial security industry.

Transforming Security

Transforming Security

Just three years ago, the “cloud” was a four-letter word in the security industry. After fronting millions of dollars to establish onpremises systems, companies were understandably reluctant to rip them apart for a new approach.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3