Top Stories


Your Best Project: Ten Security Design Tools You Must Try

SPONSORED

Your Best Project: Ten Security Design Tools You Must Try

Network design is challenging, requiring designers to balance user performance expectations with network-resource costs, capacities, capabilities, and use scenarios.

ISC West Launches Unmanned Security Expo

Exhibits & Education Dedicated to Aerial Drones & Ground Robotics

ASIS party

13th Annual Security Industry Party A Big Success

Guests enjoyed food and drinks at Tapa Toro in Orlando

Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Online Exclusive: Can Artificial Intelligence Solve the Cybersecurity Talent Drain?

Leveraging artificial intelligence and machine learning allows organizations to enjoy real time protection and risk identification, significantly reducing security risks without the need to increase staff.

Disgruntled Employee Kills Two, Himself in Workplace Shooting

Disgruntled Employee Kills Two, Himself in Workplace Shooting

Three people are dead, the shooting included in Athens, Tennessee after a workplace shooting.

Cell Phone Footage Captures Charlotte Officer-Involved Shooting

Cell Phone Footage Captures Charlotte Officer-Involved Shooting

Cell Phone footage released by the New York Times shows Keith Scott's wife pleading officers not to shoot her husband.

Fredrik Nilsson of Axis Communications to Receive Lippert Award

The Security Industry Association announced the selection of Fredrik Nilsson, Vice President, Americas, Axis Communications Inc., to receive the 2016 George R. Lippert Memorial Award.



Altronix Selects Thomasson Marketing Group for the Pacific Southwest Region

Effective immediately, TMG is representing Altronix in California, Hawaii, Nevada and Arizona.

Department of Commerce Awards XTec PIV-Interoperable Credentialing Contract

XTec adds another Federal Agency to their PIV-I hosted service offering

Farpointe Partners with Cypress on Wireless Mobile, Handheld Card Readers

Handheld Wireless Mobile Reader (WMR) System Provides Identity Verification Where Fixed Readers Can't

Network Video Helps University at Buffalo Continue to Expand Campus-wide Security

University continues to develop video security system with Milestone software and Axis cameras meet ongoing video surveillance needs

North Carolina Declares State of Emergency Following Second Night of Charlotte Protests

North Carolina Declares State of Emergency Following Second Night of Charlotte Protests

A second night of violent protests broke out in Charlotte following an officer-involved shooting.

Yahoo Confirms Data Breach of 500 Million Accounts

Yahoo Confirms Data Breach of 500 Million Accounts

Yahoo has confirmed that a copy of data for at least 500 million accounts has been stolen.

Accidental Discharge Weeks after Implementation of Campus Carry

Accidental Discharge Weeks after Implementation of Campus Carry

Campus carry was implemented at universities around Texas on Aug. 1, less than two months later a student accidentally discharged a weapon.

Violent Protests Break Out in Charlotte Following Fatal Shooting

Violent Protests Break Out in Charlotte Following Fatal Shooting

Violent protests shut down a highway in Charlotte, North Carolina following the fatal shooting of a black man.

Tricks of the Trade

One of the first things people ask at a tradeshow is if I think it was a success. This was the first ASIS in quite a few years that they got it right. This was the best ASIS in several years running. Why?

One Suspect Wanted for New Jersey, New York Explosions

Suspect in Custody after New York, New Jersey Explosions

Police have identified Ahmad Khan Rahami as a suspect in the explosions in New York and New Jersey.

Tulsa Police Releases Footage of Terence Crutcher’s Death

Tulsa Police Releases Footage of Terence Crutcher's Death

Tulsa Police Department release 911 audio, dash cam and helicopter footage of the events that led up to the fatal shooting of Terence Crutcher.

ISIS Claims Responsibility Minnesota Mall Attack

ISIS Claims Responsibility Minnesota Mall Attack

Police have identified the suspect in the Minnesota Mall attack as 22-year-old Dehir A. Adan.

Live From ASIS 2016 Wrap-up

ASIS 2016 was a successful one for many at the show, as new products and exciting sessions helped advance the security industry yet again.

Snowden Leak Caused ‘Tremendous’ Damage to U.S. Security

Snowden Leak Caused 'Tremendous Damage' to U.S. Security

A U.S. House committee issued a scathing report accusing Snowden of causing damage to U.S. security.

3 Ways iOS 10 Brings Security to Your iPhone

3 Ways iOS 10 Brings Security to Your iPhone

The top iPhone features that guard your privacy and security.

It's Not Always about New Business

The ASIS show offers many unique opportunities for the security industry.

Knee Deep in Orlando Rain

I've never minded walking in the rain. Orlando weather has provided some weather tradeshow guests probably didn't like that much. However, compiling my thoughts of Day Two brought some exciting results.

Cyber Hack Reveals Medical Data of Olympic Stars

Cyber Hack Reveals Medical Data of Olympic Stars

Olympic athletes like Simon Biles and Venus Williams were victims of a cyber breach that revealed sensitive medical data.

C-Suite Product Spotlight

ASIS Day 3 is in full swing and there was so much to see! The products that caught my eye the most were all-in-one devices or software that had added functionality to create the perfect security solution.

Views from ASIS 2016 Day 2

Day 2 at ASIS 2016 featured new product reveals and award presentations, as well as many other exciting moments.

Winning the Foot Race

I guess I've been attending ASIS for about two decades. Back in the day, I remember it was a tradeshow for guys in suits and ties. There is still a bunch of well-dressed people but I'm also happy that there is a bit more casual approach.

Free e-News Subscription

I agree to this site's Privacy Policy
  • Security Products
  • Environmental Protection
  • Occupational Health and Safety