Top News


Western Kentucky University Deploys Milestone VMS

Milestone Systems IP VMS ís proving the advantages of the open platform approach for Western Kentucky University’s diverse surveillance needs with the ability to expand and customize the system for growing requirements over the years.

Researchers Study Costs of "Dirty Bomb" Attack in Los Angeles

A dirty bomb attack centered on downtown Los Angeles’ financial district could severely impact the region’s economy to the tune of nearly $16 billion, fueled primarily by psychological effects that could persist for a decade.

Australia Department Store Group Uses Surveillance System to ID Shoplifters

With new security technology operating in its 68 stores, Myer, Australia’s largest department store group, has shown shoplifters that their game is up.

NIST Report Evaluates Performance Of Iris Recognition Software

Identifying people by acquiring pictures of their eyes is becoming easier, according to a new report from the National Institute of Standards and Technology (NIST).

Kentucky School District Sees Results With Upgraded Security Technology

The Whitley County School District in southeastern Kentucky recently installed some of the latest surveillance technology on all its buildings.

ASIS International Receives ANSI Approval for Private Security Service Provider Standard

Developed by a Technical Committee comprised of more than 200 members from 24 countries, this standard establishes a mechanism for Private Security Companies and their clients to provide demonstrable commitment, conformance, and accountability to the principles outlined in the International Code of Conduct (ICoC) for Private Security Service Providers.

Boston Red Sox Spring Training Home Uses Community Loudspeakers

For sunbirds and residents of Arizona, Florida and other warm-weather environs, baseball's spring training is a special treat. It's a time to catch an intimate pre-season game and view a team's favorite and newest players, in a casual, up-close and personal environment.

Linsanity, Whitney's Death, New Android Threats Dominate Cybercrime in First Quarter

This quarter saw a significant shift in the way the security industry approaches targeted attacks and advanced persistent threats, which are now viewed more as a long-term, ongoing campaign versus the typical "smash-and-grab incidents" favored by cybercriminals in the past, according to the Trend Micro Q1 2012 Security Roundup Report.



Hooters Restaurants Deploy Fingerprint Biometrics To Strengthen Authentication

DigitalPersona, Inc., a global provider of multi-factor authentication and access management solutions, recently announced Hooters of America, LLC (Hooters) has deployed DigitalPersona's U.are.U Fingerprint Readers to strengthen its loss prevention efforts. The DigitalPersona fingerprint readers and ITWercs Point-of-Sale (POS) software enable nearly 4,000 employees to use fingerprint readers at Hooters restaurants to authenticate transactions, as well as clock in and out for their shifts. With DigitalPersona fingerprint biometrics, Hooters has reduced both transaction and payroll fraud.

RFID to be Worth More Than $70 Billion Across Next Five Years, According to Research

The market for RFID transponders, readers, software, and services will generate $70.5 billion from 2012 to the end of 2017.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.