Top Stories


Enabling Your Own Surveillance as a Service Offering

In the dealer/integrator business, recurring monthly revenue (RMR) is like finding a gold mine with several profitable veins that can be mined. RMR is an attractive means for a secondary revenue stream.

Networking Technology is Changing

No one will argue that the network has been one of the greatest evolutions in time. Think of it, everything that you used to do by hand, you can now do via computer. Well, almost everything.

From Risk to Reward

In the professional security market, the model for revenue is changing. Systems integrators are looking for revenue beyond basic sales and maintenance—especially customer-oriented addons to generate recurring monthly revenues (RMR).

Blurring the Lines

Blurring the Lines

Thanks to wireless lock technologies, cloud-based software, and smartphone/tablet integration, it is now possible to deploy a secure, manageable, and cost-effective security solution without the need for complicated and expensive infrastructure.

The Tide of Security

The Tide of Security

Before installing a networked, open-platform, VMS solution, the Port of Antwerp had a standalone DVR system with no networking capabilities and no open platform support, meaning only a limited number of camera brands were supported.

Shifting Towards the Cloud

Shifting Towards the Cloud

Video surveillance has dramatically changed in recent decades. Open, IP-based network technology has largely replaced the closed, proprietary world that long dominated the security industry.

Rethinking Access Control

When it comes to access control, it all boils down to companies trying to determine whether you are who you say you are, and whether you are authorized to access certain information. As we all know, both those are tall orders to fill.

Keeping the Perimeter Protection

Radar may not be the first technology that comes to mind when discussing perimeter protection, but that is all beginning to change.



Times are Changing

My, how times are changing the way we do business… in the publishing industry. Without going back to the details of yesteryear, the manner in which a publication is produced has changed from cut and paste, to the digital version of today.

A Successful Data Security Plan

We live in a world where computer hacking, data breaches, identity theft, and stolen records of all sizes have become worldwide events that can happen at any time.

Dunkin

Dunkin' Donuts Reward Program Users' Data Made Vulnerable

The coffee chain says hackers might have accessed customer info through a data breach.

The Evolution of Endpoint Security Demands Detection and Response

The Evolution of Endpoint Security Demands Detection and Response

Legacy endpoint prevention and protection solutions are limited when faced with advanced and sophisticated threats

California City Adds Surveillance Cameras to Park

California City Adds Surveillance Cameras to Park

The cameras are expected to cost about $30,000 and will be installed in about three months.

Ohio Hospitals Disrupted by Ransomware Attack

Ohio Hospitals Disrupted by Ransomware Attack

“The OVMC-EORH employees and medical staff have been very adaptive and supportive, and we are able to continue with quality patient care,” Ohio Valley Medical Center CEO Daniel Dunmyer said.

New Zealand Bars Chinese Firm’s 5G Rollout Due to Security Concerns

New Zealand Bars Chinese Firm’s 5G Rollout Due to Security Concerns

Huawei, the world’s biggest producer of telecoms equipment, has faced pushback from governments due to concerns that its technology could be used for unsavory purposes such as spying.

Security by Default: 5 Principles for Building More Secure Apps

Security by Default: 5 Principles for Building More Secure Apps

Here are five principles that developers should keep in mind to create more secure apps

Three Cybersecurity Must-Haves for Small Businesses

Three Cybersecurity Must-Haves for Small Businesses

Tips and tactics for ensuring your small business is safe from the threat of cyberattacks.

USPS Security Flaw Exposes Personal Data of 60 Million People

USPS Security Flaw Exposes Personal Data of 60 Million People

A security hole in a mail preview program may have made the data of 60 million customers vulnerable.

New Security Measures for Berlin Christmas Market Following Attack in 2016

New Security Measures for Berlin Christmas Market Following Attack in 2016

The site of Berlin's devastating 2016 truck attach has now become a testing area for heavy security.

Germany Proposes Router Security Guidelines

Germany Proposes Router Security Guidelines

The German government has prosed guidelines to increase router security including what kind of routers are sold and installed across the country

Learning from a $150 Billion Compliance Failure

Learning from a $150 Billion Compliance Failure

How a 10-minute survey cost Facebook $150 billion

Phoenix Valley Metro Creates Safety App for Riders

Phoenix Valley Metro Creates Safety App for Riders

When a rider uses the app or a text to report a non-emergency security incident, the operations center alerts security staff so they can find the corresponding train and respond to the report.

Jacksonville to Create Uniform Surveillance System

Jacksonville to Create Uniform Surveillance System

“By tying in cloud-based or network-based cameras into JSO’s larger infrastructure, it will help them investigate crimes, it will help them with a number of different capacities as it relates to where to put patrols,” Hughes said.

Physical Security Equipment Market to Reach $64 Million by 2022

Physical Security Equipment Market to Reach $64 Billion by 2022

The physical security equipment market will see an increase in the next few years, largely due to threats and terrorism around the world.

Employee Cybersecurity Habits Worsen

Employee Cybersecurity Habits Worsen

According to the survey, three of every four respondents admitted that they reuse passwords across accounts, an increase from the 56 percent of respondents who admitted the same in the survey’s 2014 edition.

Security Vulnerabilities in Top Christmas Gifts

Security Vulnerabilities in Top Christmas Gifts

Internet connected devices might be the hot item for Christmas this year, but are they secure?

Cybersecurity Tips for Holiday Shoppers

Cybersecurity Tips for Holiday Shoppers

Recommendations for safe online holiday shopping - a cybersecurity perspective.

Featured

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.