Top Stories


Apple enforces user data security with new updates

Apple Enforces User Data Security with New Updates

Apple has “you control your data" for a while now, but with these new updates, the data is almost completely the consumers’.

LabCorp Announces AMCA Breach May Have Affected Their Patients

LabCorp reported that about 7.7 million patients’ personal information may have been compromised in the AMCA data breach.

How Organizations Can Leverage Microsegmentation to Create a Zero Trust Environment

How Organizations Can Leverage Microsegmentation to Create a Zero Trust Environment

No matter how good an organization’s perimeter defenses and threat detection systems are, it really is just a matter of when it will get breached.

Cequence Security Expands Its Security Platform with CQ appFirewall

New security module leverages the platform’s CQAI analytics engine to bring much-needed innovation unavailable in legacy web application firewalls

Australia Reels from Worst Mass Shooting in Over 20 Years

Australia Reels from Worst Mass Shooting in Over 20 Years

At least four people were in killed in the first mass shooting Australia has seen since 1996.

AMCA Makes Statement on Quest Diagnostics Vendor Breach

AMCA Makes Statement on Quest Diagnostics Vendor Breach

The AMCA said they hired a third-party external forensics firm to investigate the Quest Diagnostics data breach

Kentucky Public Library to Hire Security Resource Officers

Kentucky Public Library to Hire Security Resource Officers

The Warren County Public Library is hiring resource officers to boost safety and security.

General John F. Kelly to Present Keynote Address at GSX 2019 on Military & Law Enforcement Appreciation Day

The presentation, titled Geopolitics and Security, will take place on Wednesday, 11 September from 8:30 – 10:00 AM and will be open to all All-Access Pass holders.



ADT Awarded $4 Million, including Punitive Damages, in Lawsuit Against Alder

Company diligently fighting deceptive sales practices in the security industry

Georgia City Council Weighs New Security Measures Following Mass Shooting

Georgia City Council Weighs New Security Measures Following Mass Shooting

The decision to add metal detectors to a municipal building in Marrietta, Ga. is getting moved forward following the Virginia Beach mass shooting.

Security Experts Weigh in on Quest Diagnostics Vendor Breach

Security Experts Weigh in on Quest Diagnostics Vendor Breach

Quest Diagnostics has warned its 12 million customers that their personal, financial and medical data may have been exposed.

Panasonic Sells Off Security Side of Business

Polaris Private Equity Fund IV, L.P., etc., managed by Polaris Capital Group Inc. have recently agreed to a strategic capital alliance with Panasonic Corp. to acquire 80 percent of the outstanding shares of the company to be newly established by Panasonic to succeed the Security Systems Business.

12 People Dead in Virginia Beach Municipal Building Shooting

12 People Dead in Virginia Beach Municipal Building Shooting

The shooting, which took place in a municipal building in Virginia Beach on Friday, is now the deadliest mass shooting this year.

Leveraging the System

Leveraging the System

For decades, public alerting systems have served as a critical notification tool for sending alerts to citizens’ smartphones, landlines and through broadcast channels.

Reducing Violence

Reducing Violence

In recent years, however, King City has become known for a different reason; in both 2013 and 2015, the city’s homicide per capita rate for victims between 18 and 22 years of age was the highest in the state of California. The main reason for this is that the city had become a point of contention in a turf war between rival Latino gangs to the north and south of King City.

Elevating Data Center Security

Elevating Data Center Security

The endlessly growing mountains of personal, private data collected as part of routine transactions in our digital world continue to be a target for cybercriminals, who are moving beyond digital theft to the real world by targeting the servers that contain this data.

Security Beyond the Field

Security Beyond the Field

As you walk into a venue to cheer on your favorite team, or see a favorite singer or show, it’s likely that one of the last things on your mind is the potential for a cyber attack.

Taking a Shot at Violence

I suppose when the topic of government security comes up, we often think big, as in the federal government. Let’s back it down a little bit and think of King City, Calif.

Securing the Building

Securing the Building

Multi-tenant buildings come in a variety of shapes and sizes, from a few to dozens of stories tall. Tenants may include residents, professional service providers, commercial businesses, government agencies or retail shops.

A Sustainable Future

Just a few months ago, the Intergovernmental Panel on Climate Change (IPCC) issued its special report on the impact of climate change.

Working Together

Although IP-based network cameras are the prevailing standard for new installations, it wasn’t that long ago that analog cameras, and the complex infrastructures required to support large numbers of them, were the only way to accomplish the job.

How Deep is Deep Learning?

At the start of every new year, I get a sampling of what new technologies are going to be introduced. Most of the time, I’m in way over my head. Sometimes I understand and relate to the solution, the technology and what it all means.

Secure Your Engines

Secure Your Engines

When this upgrade project began in early 2017, there was a mix of standard-resolution legacy video cameras scattered throughout the facilities.

One Step Ahead

One Step Ahead

According to Aite Group, a research and advisory firm, losses incurred by account takeovers at contact centers are expected to reach $775 million in 2020, nearly double the amount from just five years ago.

Strategic Decisions

Strategic Decisions

An SDSC is a crime-fighting nerve center that facilitates decision making through increased intelligence and better understanding. Built using dedicated hardware and software solutions, they are housed in local police departments of big and small cities.

The Game Changer

The Game Changer

Most access control systems are focused on improving security and protecting the business, ensuring that only the right people have the right access to the right areas. It keeps the bad guys out and the good guys in.

Everything in Between

Today, artificial intelligence and machine learning are backing a wide range of technologies and applications, powering diverse solutions to a broad set of challenges.

A Healthcare Revolution

A Healthcare Revolution

In 2017, the state of California passed Senate Bill 1299, ushering into law a set of regulations requiring California healthcare providers to take specific steps to prevent workplace violence and ensure a safe environment for both patients and caregivers.

Taking the Sting out of Surprise

Taking the Sting out of Surprise

It is a story as old as time. Burglars and thieves break into a business, cause major damage to the property, and get away with valuables that can be costly to replace— not to mention potentially company proprietary information.

Detroit Metro Airport Enhances Security with K9s

Detroit Metro Airport Enhances Security with K9s

K9s will be used at the Detroit airport to add an additional layer of security in the airport's busiest season.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.