Top News


Automated Critical Security

Automated Critical Security

Thousands of people pour into and out of high-rise office buildings each day, and each must be kept safe and secure.

Safer Cities

Safer Cities

In Sinaloa, Mexico, the state’s government views enhancing public safety and security as priority number one. Sinaloa’s climate and terrain are perfect for supporting its booming agricultural and industrial economy, and this prosperity is dependent on effective law enforcement efforts that combat the influence of powerful drug cartels entrenched within the region.

Beyond the Basics

Beyond the Basics

A security camera is much more than a security camera when it’s part of an analytics infrastructure that serves completely new goals, advancing the organization and management of businesses and even entire cities.

Smartphone Popularity

Smartphones fulfill many needs, including telephone, camera, navigation, music, video, clock, news, calculator, email, internet, gaming, contacts, and more.

Security on a Grand Scale

When we talk about government security, the first thoughts are of the federal government. It is true that the federal government is bloated and somewhat mismanaged, but let’s talk about security on the grander scale; safe cities and even safer schools.

The Evolution of Intercom

The Evolution of Intercom

In 1970, intercoms were all about convenience. They made it easy for secretaries to communicate with their boss and for company employees to connect between offices within the same building.

The Problem Persists

The Problem Persists

While the security industry is being sold on UPS battery back-ups that come with “power conditioning” built in, the reality is that over 90 percent of these battery back-ups only offer surge suppression and surge suppressors that solely protect against large power fluctuations, such as lightning, which only account for two percent of failures.

A Good Endpoint

Most of the malicious or criminal activity targeting today’s enterprises involves the endpoint. Insecure endpoints are an expensive risk and difficult to address.



Forensic Analysis and Security

Forensic Analysis and Security

Connected or smart devices in or on buildings, vehicles, and even people include software, mobile apps, sensors, and network connectivity used to collect and exchange data.

Building Safer Cities

Safe City, or Smart City, projects are rapidly becoming an ideal way to build an effective and proactive security strategy while allowing increased collaboration between city officials, security leaders, law enforcement, and first responders.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.