Online Exclusives


A Work of Art

Located on the campus of Duke University, the Nasher Museum of Art displays a growing collection of modern and contemporary art. With an exhibition space of more 65,000 square feet it is one of the most important university are museums in the country.

Verify the Signature

Banks, financial institutions, municipal, state and federal governments are demanding more reliable, less expensive authentication and authorization systems for everyday activities, from performing financial transactions to boarding an aircraft, entering a secure physical location or crossing international borders.

Leaving Your Mark

Today’s mobile professionals carry more sensitive information than ever before. A single laptop can contain information that can be valued in the millions, if not billions, of dollars.

Crossing the Chasm: Deterrence to Defeat

In this age of widespread easy access to personal information, identity theft has become the fastest growing and most lucrative crime in America.

Mobile Monitoring

Internet-enabled products and services are now gaining wider acceptance and delivering better results than before. Remote monitoring services are no exception.

Case Study: MITOC

Regardless of the scope and scale, when disaster strikes, first responders need a rapid and effective way to collect and communicate information in the early moments.

Tools Designed for Securing Tools

There are two "S"s critical to the construction industry: safety and security. Protecting workers from harm is obviously of primary concern, but protecting assets on the jobsite against theft is also on the top of one's mind.

Critically Speaking

Critical infrastructure organizations are essential to the functioning of societies and economies. The role of these facilities in international commerce makes their security a top priority. But given the complex and often geographically dispersed nature of these facilities and assets, critical infrastructure security often presents a daunting challenge.

On the Fast Track

An organization suspects that an employee is not following his or her route. In the past, a security manager would personally follow the employee or instruct someone to do so. This tactic is time consuming, especially if, on that particular day, the employee actually goes where he’s supposed to go.

Disaster Preparation for the 21st Century Business

Business is all about managing risk, and risk management comes down to making solid business decisions to avoid and mitigate potential threats, including natural disasters.

Safe and Risk-Managed

While every individual and organization that provides security products or services will have their spin on what security is and how to achieve the desired level, the truth is, security is essentially an unachievable outcome. A common definition of security is, “freedom from danger, fear and anxiety.” Security defined as such is, therefore, unattainable.

On the Fast Track

Rise of the Digital Certificates

Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?

Ready for Takeoff

When hurricanes in 2005 leveled the Charlotte County Airport in Punta Gorda, Fla., airport officials chose to rebuild, and to do so stronger and smarter. That meant making sure the airport’s security system satisfied federal and state regulations in a post-9/11 world that had to protect against potential terrorists turning airplanes into deadly bombs.

The Power of PoE

With an explosive demand for security monitoring worldwide, cameras are appearing in every conceivable location. The challenge is how to support this rapidly growing infrastructure with affordable and flexible real-world solutions. The adoption of PoE offers new opportunities for the design of products directly powered over Ethernet lines, drastically reducing overall installation and maintenance costs.

Transit Agencies Work with TSA to Improve Security

Several New York regional authorities have teamed with TSA to increase security, focus on threats and to make funding available to the right people, for the right projects at the right time.

Sound the Alarm

If you pick up any local employment guide, you cannot avoid seeing the many call centers with ads that read, “Customer service representatives wanted—immediate hire.” Why are these call centers continuously struggling with hiring and turnover?

Meeting Terrorism Head On

Politicians know full well the impact of terrorism in Europe. They’ve faced it for years, if not decades.

Producing an Advantage

Have you ever looked at a surveillance image and wondered why the image quality is so poor when compared with the clear, detail-packed images captured by consumer digital cameras or even the newest cell phones?

Prepare for the Worst

Often, when people think of business continuity and disaster recovery, they immediately focus on protecting their employees and organization’s key assets, such as facilities and inventory. However, in more recent years, many have become significantly more reliant on computer infrastructures and the data that is produced with these systems.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.