Top News


New Airline Safety Video Sure to Please Web-savvy Passengers

New Airline Safety Video Sure to Please Web-savvy Passengers

Video features familiar faces, animals and animations.

Password Recovery Questions are a Terrible Way to Protect Online Accounts

Password Recovery Questions are a Terrible Way to Protect Online Accounts

A new research paper found that people often choose obvious answers that are easy for hackers to guess.

School Security Findings from National Center for Education Statistics Survey

School Security Findings from National Center for Education Statistics Survey

Overall, reporting violent incidents is down 9% perhaps due to beefed up security.

Music Festival Safety Coordinated with Milestone Video

Unified Command’s mobile security unit uses XProtect IP video management technology to manage crowd services with fast incident response.

Pelco by Schneider Electric Releases Optera Series

Panoramic cameras featuring unique panomersive experience.

Security Video Shows Bikers Fleeing Gunfire and Guiding Others to Safety

Security Video Shows Bikers Fleeing Gunfire and Guiding Others to Safety

The video captured the events of the Waco biker violence.

IDEAL Networks Releases Latest Generation of DataCENTER Software

Free software allows datacom professionals to download, manage, edit and print pdf reports in three easy steps.

Bin Laden Haunted by Fear of Being Hunted

Bin Laden Haunted by Fear of Being Hunted

Recently declassified letter warns wife to take extra precautions, discusses Internet security and overall physical security for Al-Qaeda members.



PSA Security Network Announces New National Deployment Program

First of its kind online platform to bring comprehensive search and mapping tools to the physical security industry.

Exacq Technologies Announces Integration with Tyco's Sensormatic Anti-theft System

Real-time loss event data improves merchandise protection.

Featured

  • Agentic AI Will Revolutionize Cybercrime in 2025 According to New Report

    Malwarebytes, a provider in real-time cyber protection, recently released its 2025 State of Malware report, which reveals insight into the emergence of agentic artificial intelligence (AI), plus the year’s most prominent threats and cybercrime tactics. The report details a significant uptick in the number of known ransomware attacks, the total value of ransoms paid in 2024, and how IT teams can address them. Read Now

  • ESX 2025 Announces Expanded Schedule of Events

    ESX has announced its dynamic 2025 schedule, set to provide an unparalleled experience for professionals in the electronic security and life safety industry. Taking place June 16-19 at the Cobb Galleria Centre, this year’s event features an expanded lineup of educational sessions, hands-on workshops, inspiring main stage speakers, networking opportunities, and an engaging expo floor showcasing the latest technology. Read Now

  • City of New Orleans Launches NOLA Ready Public Safety App Before Super Bowl

    The City of New Orleans Office of Homeland Security and Emergency Preparedness (NOHSEP) is pleased to announce the official launch of the NOLA Ready Public Safety App, powered by Motorola Solutions. This new mobile application is designed to enhance public safety and emergency preparedness for both residents and visitors. All individuals planning to attend major events in New Orleans, including the Super Bowl, Mardi Gras, and other large gatherings, are encouraged to download the app. Read Now

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”