Top Stories


Reasons to Implement a Zero Trust Security Model

Reasons to Implement a Zero Trust Security Model

Six reasons companies should implement a Zero Trust Security Mode.

Security at Scale—With Great Success Often Comes Great Security Problems

Security at Scale—With Great Success Often Comes Great Security Problems

Some common areas and issues to keep growing your business, not your security risk.

Cyber:Secured Forum 2019 Reveals Preliminary Agenda

The second annual summit hosted by ISC Security Events, PSA Security Network and the Security Industry Association will tackle a variety of the latest cyber-physical security trends.

Eight Injured After Driver Intentionally Drove into Crowd in California

Eight Injured After Driver Intentionally Drove into Crowd in California

A driver intentionally plowed into pedestrians in California and injured eight people, according to police.

Steel Bollards Added to Memphis

Steel Bollards Added to Memphis' Beale Street

Four sets of steel bollards have been installed on Memphis' iconic Beale Street as part of a safety improvement plan.

Indianapolis Works on Repairing Surveillance Cameras, Adding Connectivity

Indianapolis Works on Repairing Surveillance Cameras, Adding Connectivity

When it comes to citizen safety, the police cameras in Indianapolis are meant to keep an eye on crime and help catch potential threats.

Army Considers More Multi-Factor Authentication Measures

Army Considers More Multi-Factor Authentication Measures

The U.S. Army is working toward adding more authentication measures to provide more options to access Army online resources while maintaining information technology system security.

GDPR

GDPR's Impact on Incident Response

Beyond user privacy, we’ve seen GDPR impact companies in other ways.



Public Safety Cameras Aid Chattanooga Police in Investigations

Public Safety Cameras Aid Chattanooga Police in Investigations

The Chattanooga Police Department has 29 public safety cameras located around the city and plans to add more.

Bee'ah Selects Johnson Controls and Microsoft for its Office of the Future

Bee’ah’s sustainable headquarters will be infused with artificial intelligence across systems and spaces, including a digital concierge for every occupant and visitor

Almost 300 Killed in Easter Sunday Attacks in Sri Lanka

Almost 300 Killed in Easter Sunday Attacks in Sri Lanka

Almost 300 people were killed and hundreds more were wounded in Sri Lanka on Easter Sunday in a series of coordinated attacks that struck three churches and three hotels.

Physician-Staffing Company Data Breach Exposes Personal Data for About 31,000 Patients

Physician-Staffing Company Data Breach Exposes Personal Info of About 31,000 Patients

EmCare Inc., a physician-staffing company, says a data breach has exposed personal information for about 31,000 patients

Review: Brinno DUO Smart Peephole Doorcam

Review: Brinno DUO Smart Peephole Doorcam

How to Stay Safe on Public Wi-Fi Networks: A Detailed Guide

How to Stay Safe on Public Wi-Fi Networks: A Detailed Guide

All of your personal data can be easily accessible and vulnerable to hackers.

Biometric Technology Market to Grow to $59.31 Billion by 2025

Biometric Technology Market to Grow to $59.31 Billion by 2025

Due to the growing use of biometrics to counter security threats, the biometric technology market is expected to bloom over the next few years.

Chicago-Area Metra Launches Security App

Chicago-Area Metra Launches Security App

Chicago Metropolitan Metra transportation system launches a smartphone security app to report safety concerns.

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Why Do Hospitals Keep Falling for Email Hacks? A Few Reasons...

Hospitals are often in the news due to data breaches, and email hacks are often the cause.

Arcules Adds Access Control-as-a-Service to its Suite of Cloud-based Offerings

Arcules recently announced the addition of access control-as-a-service (ACaaS). Arcules now enables customers to centrally manage access control effectively across geographically dispersed business locations in a single, intuitive user interface

HID Global's Augmented Reality Tool Helps Educate Integrators, Installers and Consultants About its Solutions

HID Global® recently introduced an augmented reality tool that innovates how integrators, installers and consultants deploy and use HID's access control products.

Bosch Focuses on Solutions at ISC West

At ISC West, Bosch showcased how its offerings deliver value to integrators and end users by enhancing security, improving efficiency, and solving common challenges. Visitors to the booth will see intelligent solutions for vertical markets and new products and services that make systems easier to install and manage.

Dahua Technology USA Adds Under Vehicle Surveillance System, Enterprise-Level DSS and EVS to Its Specialty Portfolios

Dahua Technology has announced the addition of targeted vertical market solutions in the North American market

How to Execute a SOC 2 Report — From Planning to Distribution

How to Execute a SOC 2 Report — From Planning to Distribution

Many companies are employing System and Organization Controls reports before procuring vendors' services.

This California Health Network Was Just Hacked for the Third Time

This California Health Network Was Just Hacked for the Third Time

What went wrong?

Lyft Adds New Security Measures for Riders

Lyft Adds New Security Measures for Riders

Lyft has announced two new features to enhance the security and safety of the riders using the Lyft platform.

Live From ISC West 2019 Wrap Up

Six Updates Companies Need to Make to Modernize Their Cybersecurity

Six Updates Companies Need to Make to Modernize Their Cybersecurity

Six things you can do to be proactive against potential cyber crimes.

Kastle Systems and Rise Buildings Partner on Breakthrough Mobile App Integration

Kastle Systems International and Rise Buildings recently announced an agreement to integrate Kastle's digital mobile access credential functionality with Rise Buildings' advanced occupant experience app.

An Amazing Opportunity at ISC West

By the end of the three-day security extravaganza also known as ISC West, I've seen and heard about hundreds of products and solutions. I'm ready for a break. Typically, that comes in the form of an airplane ride home. Not this time.

Are Voice-Enabled Devices Prioritizing Convenience Over Security?

Are Voice-Enabled Devices Prioritizing Convenience Over Security?

Are voice-enabled devices making you more vulnerable to cyberattack?

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.