Top News


Mostly Ignored Cybersecurity Collaboration is Becoming a Reality

Times have started changing for the better in the U.S. cybersecurity world. After years of minimal effort to get together to discuss cyberattacks and breaches and share some pertinent data, big companies and the federal government have finally started to collaborate on mitigating big cybersecurity issues.

Stadium Security Goes High-tech With Elevated Standards, New Innovations

Stadium Security Goes High-tech With Elevated Standards, New Innovations

When it comes to physical security, the world around us has changed. First, society has changed, with more social unrest and violence occurring in the COVID-19 era, including a rise in fan misbehavior at sporting events. Second, stadiums have changed, with more high-tech amenities, luxuries and conveniences.

Corporate Organizations: Have You Made Your Solutions Permanent?

For a variety of reasons, cybersecurity experts are urging caution as we enter 2022.

Supply Chain Hits Cybersecurity Hard

The unpredictable shortage of goods because of pandemic-triggered supply chain problems is broad: plastic cup lids, woodworking tools, paper goods, and lumber, to name a few.

Balancing Fraud Prevention and Customer Experience

We sat down with Bala Kumar, CPO of Jumio, to discuss balancing the customer and fraud prevention.

Why Hardware-Encrypted USB Drives Are the Best Option for Regulatory Compliance in 2022

Many governments and industries worldwide have mandated that various forms of personal data be protected by encryption while at rest or in transit.

InfraGard National Members Alliance and NEC Corporation of America Join Forces in the Fight Against Human Trafficking

InfraGard National Members Alliance, an FBI-affiliated nonprofit organization dedicated to protecting U.S. critical infrastructure and the American people, and NEC Corporation of America have joined forces in the fight against human trafficking. In honor of National Human Trafficking Prevention Month in January,

2022 Payments Summit Agenda Features In-Depth Sessions on Mobile and Contactless Trends, BNPL, Fraud Mitigation, Cryptocurrency and Authentication

The Secure Technology Alliance’s 2022 Payments Summit will feature a full agenda of industry-defining topics. Sessions will explore contactless and NFC innovations, buy now, pay later and peer-to-peer transactions.



SecurityCEU.com Launches Frontline Project Management Online Training Course

SecurityCEU.com has launched the Frontline Project Management Course, a new online training in partnership with industry-renowned educator Nadim Sawaya, MSCE, CPP.

Napco Announces new New England Rep, Nationwide Application Sales Support

NAPCO Security Technologies Inc., is pleased to introduce Mark Miller as the new regional sales manager for New England, and Paul Hoey, former RSM, as new systems applications support provider for the country.

Featured

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3