Top Stories


The Most Common Healthcare Security Problem Could Be Right Under Your Nose

The Most Common Healthcare Security Problem Could Be Right Under Your Nose

The question is this: How can healthcare organizations protect themselves against threats when most originate from within their own walls?

LabCorp Data Breach Put Millions at Risk

LabCorp Data Breach Put Millions at Risk

Millions of personal data records are vulnerable after a breach was detected at LabCorp.

Why Smartphone Apps Could Soon Replace Car Keys

Why Smartphone Apps Could Soon Replace Car Keys

Sooner or later, a smartphone app will be able to unlock your car. But what are the potential security issues that come with this new technology?

University of Alabama to Introduce Metal Detectors to Football Stadium

University of Alabama to Introduce Metal Detectors to Football Stadium

The Crimson Tide will be introducing metal detectors to football games starting in the fall.

The Average Cost of a Data Breach

The Average Cost of a Data Breach

IBM Security and Ponemon Institute have released their study on the average cost of a data breach.

Amazon Prime Day Deals on Security Products

Amazon Prime Day Deals on Security Products

Amazon Prime Day is here! Here are the best discounts on security products.

Largest Hospital System in New York Arms Guards to Prevent Mass Casualty Attacks

Largest Hospital System in New York Arms Guards to Prevent Mass Casualty Attacks

Qualified security guars at North Shore University Hospitals will now be armed amid shooting incidents in New York.

Structured Innovations Announces Merger with Legacy Marketing Reps

Leading Ohio-based manufacturers’ rep firm joins forces with top security rep firm in the Great Lakes region to offer communication infrastructure, A/V and security solutions.



Secret Service Issues Guide to Identify Threats for Schools

Secret Service Issues Guide to Identify Threats for Schools

A threat assessment program create standards for teachers and peers to identify threats before they happen.

Altronix Expands Trove Access and Power Integration Solutions with Paxton Access

Provides integrators with greater flexibility and efficiency

Keeping Your Office Safe and Secure

Keeping Your Office Safe and Secure

Office security is always important, but in the summer, it can get more lax.

Three Ways To Ruin A Security Director

Three Ways To Ruin A Security Director's Day

Whether your title is Security Director or you just have the responsibilities of one, there’s a lot riding on your shoulders.

Be Strong

Be Strong

Looking at examples of how municipalities or governments protect these assets can help businesses plan as well. Critical infrastructure for businesses often shares similar needs with municipalities: how do we best protect servers, structures and the people who live and work in private buildings?

Keeping Your House Secure

Keeping Your House Secure

Conversations about what can be done to keep violent weapons and dangerous materials from falling into the wrong hands continue to dominate the political discussion, leaving communities wondering about what they can do to prevent the next school or church attack.

Protecting Your Data

Protecting Your Data

Even if you don’t have a Facebook account, you have undoubtedly heard the reports about how Cambridge Analytica accessed the personally identifiable information (PII) of up to 87 million users over a period of several years.

Key Considerations

Key Considerations

Having both specific and shared goals is what makes medical centers quite unique to security. Rarely are two buildings alike, yet they all have common needs, requirements and goals.

Trusted Identities

Trusted Identities

As with all major sporting and entertainment events, the goal is for everyone using a ticket to have purchased it from the authorized ticketing entity and to have a seamless experience both when they pick it up and when they present it at the venue.

Integrate to Save

Integrate to Save

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT.

Layering Facility Security

Layering Facility Security

Today’s facility operators must prepare for virtually any event from vandalism to a terrorist attack. With facilities ranging in size and use—from an emergency communications center to a multi-family apartment building—there’s no readily available one-size-fits-all security plan.

Bollards at the Benz

Bollards at the Benz

While the threat of terrorists planning to attack soft targets, such as stadiums, increases, stadium security professionals must look for the weak points throughout their facilities to determine where fanatics are most likely to assail.

Swinging For The Fence

Swinging For The Fence

With more than 120 permanent network cameras in place at Volunteer Stadium and Howard J. Lamade Stadium, Little League International works to add new technologies each year to keep the installation as secure as possible

Red Hawk Buys SDT to Grow Presence in Philadelphia Region

Red Hawk Fire & Security, LLC. has announced the purchase of Security and Data Technologies, Inc., (SDT) to continue extending its reach to customers in Philadelphia, and the tri-state area of Eastern Pennsylvania, Central and Southern New Jersey and Delaware.

The New World We Live In

I’m old enough to remember fire alarm drills and hiding under my desk as a youth. The fire alarm drills were great because we were able to leave the classroom and go outside. I never understood hiding under the desk, but went along with it anyway. That’s the world I grew up in.

Comparing Wireless Communication Protocols

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

Clustering Attacks on Web Apps to Find the Real Story Behind the Headlines

Clustering Attacks on Web Apps to Find the Real Story Behind the Headlines

Our goal of clustering attacks on web applications is two-fold

Reducing Crime

Reducing Crime

With police departments often being under budgeted and over worked, resulting in reduced patrols and delayed response, many business owners have come to expect that valuable assets stored outdoors are going to be subject to theft and vandalism, and these costs just need to be absorbed.

Foxwoods Casino Upgrades Video Surveillance System

Foxwoods Casino Upgrades Video Surveillance System

As Foxwoods grew and expanded, so did the need for a state-of-theart, integrated video surveillance system to provide necessary coverage and security for the gaming facilities.

Going Global

Going Global

The new and growing interest in the technology sector has given rise to a new phenomenon known as “Tech tourism,” whereby tech companies have seen ever increasing numbers of visitors being attracted to their sites as tech enthusiasts undertake a kind of digital pilgrimage.

Moving From Mechanic to Electric

In 2017, the HUSD sought to upgrade existing mechanical locks to electronic locks. With more than 5,000 doors across 28 campuses districtwide, the transition was sure to be a significant undertaking.

Integrators are Product Savvy

It has become crystal clear to me that integrators and distributors are experts in product development in this industry.

Featured

  • New Research Reveals Global Video Surveillance Industry Perspectives on AI

    Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency. Read Now

  • SIA Urges Tariff Relief for Security Industry Products

    Today, the Security Industry Association has sent a letter to U.S. Trade Representative Jamieson Greer and U.S. Secretary of Commerce Howard Lutnick requesting relief from tariffs for security industry products and asking that the Trump administration formulate a process that allows companies to apply for product-specific exemptions. The security industry is an important segment of the U.S. economy, contributing over $430 billion in total economic impact and supporting over 2.1 million jobs. Read Now

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.