Top Stories


Amazon Releases Cloud Cam

Amazon Releases Cloud Cam

The Cloud Cam is part of the online retailer’s new Amazon Key in-home delivery service, which was announced in late October.

REVIEW: Abode Starter Kit is Perfect for DIY Security Beginners

Abode Starter Kit is Perfect for DIY Security Beginners

Abode’s starter kit comes with two door or window sensors, a motion sensor camera and hub.

Axis Communications to integrate 2N's operations in the U.S. and Canada

To expand 2N’s position in the North American intercom market, 2N’s U.S. and Canadian operations will be integrated with Axis’ North American operations come the new year.

TSA Testing New Credential Authentication Technology

TSA Testing New Credential Authentication Technology

This new credential authentication technology may speed up the TSA process and improve airport security.

iOS 11 Security and Privacy Settings to Check Right Now

iOS 11 has some settings you should adjust to keep a tighter lid on your online privacy and security.

Solar Powered Security

Useable in all kinds of weather, 24/7/365, the gates have numerous options for allowing access including remote control key fobs, keypad, wireless intercom or manual wired pendant.

Churches Around the Country Revaluate Security Following Church Massacre

Churches Around the Country Reevaluate Security Following Church Massacre

The mass shooting at a South Texas church during services Sunday has many churches across the country reevaluating their security.

26 Dead in South Texas Church Shooting

26 Dead in South Texas Church Shooting

The incident, which took place in a small community about 40 miles outside of San Antonio, has been called the largest mass shooting in Texas history.



Trump Account Deactivation Raises Twitter Security Questions

Trump Account Deactivation Raises Twitter Security Questions

The temporary deactivation Thursday of the personal Twitter account of President Donald Trump, @realDonaldTrump, by a customer support employee on their last day of employment has raised questions about Twitter’s internal security.

Evaluating Campus Security Following California Hostage Situation

Evaluating Campus Security Following California Hostage Situation

The standard campus entry policy at the front desk did not deter him.

TBFAA Names United Central Control’s Sonny Sampson as ‘Person of the Year’

The Texas Burglar & Fire Alarm Association has named United Central Control's Sonny Sampson as the 2017 Person of the Year.

IdentiSys acquires ACS and ACS East

Identification, Emergency Response, Security Solutions and On-site Service Provider expands into Pennsylvania tristate area.

iPhone X Face ID May Risk User's Facial Data

The iPhone X releases today, and with it come more concerns about the privacy and security of its new Face ID feature.

DHS Looks to Boost Border Security with Facial Recognition

DHS Looks to Boost Border Security with Facial Recognition

The Department of Homeland Security is soliciting facial recognition technology that can passively scan the faces of people crossing the U.S. border by car.

NYC Marathon Increases Security In Wake of Terror Attack

NYC Marathon Increases Security In Wake of Terror Attack

NYPD to increase NYC Marathon security following terror attack in Lower Manhattan

Idesco To Showcase Full Line of ID Card Printers At ISC East

ID card solutions provider to showcase its latest security solutions at ISC East this month at booth #812

IPVideo Corp. Showcases Mobile Command Vehicle at ISC East; Kicks Security & Mobile IoT Management Into High Gear

Leading manufacturer of IP-based video surveillance will be showcasing its full line-up of video management products within a mobile setting at ISC East in NYC in booth #729.

6 Dead, 15 Injured after Vehicle Attack in Lower Manhattan

UPDATE: 8 Dead, 11 Injured after Vehicle Attack in Lower Manhattan

A suspect drove a rental truck down a bike path striking people in it's path.

3 People Killed In Colorado Walmart Shooting

3 People Killed In Colorado Walmart Shooting

Three people are dead after a man open fires in a Walmart.

Branch Banking

Branch Banking

While retailers have been incorporating video analytics into their daily operations for decades, financial institutions have lagged well behind the technology curve.

The Age Of Collaboration

The organizations of today have a wealth of technology at their fingertips, highlighting new features and advancements that are changing the way these entities do business, how people work and the interconnectivity between the two.

Keeping the Stars Aligned

Multi-tenant buildings present security challenges not found in single-user facilities. Tenants may come and go at different times.

The IP Evolution

A few advantages with IP-based systems worth mentioning are remote access anytime, anyplace; digital images do not degrade over time; real time analytic capability; and content distributed electronically quickly and easily.

Are We All in on Security

I suppose it’s only a matter of time before another obscene, violent act will make headlines across the world. I do not wish for this, but these days it seems to be one wave after another.

Maintaining Customer Trust

Maintaining Customer Trust

There are a few things you should know about the consulting business in the security industry. First, it is a must to be a trusted security advisor.

Making the Case

Established security integrators often deal with prospects who are also considering solutions that let them eliminate live monitoring and keep an eye on their homes via smartphone.

It’s a Woman’s World

It’s a Woman’s World

As with the technology in the industry, times are changing and Nancy Ford, and many other women, are now filling the rank and file of a booming industry.

The New First Responder

The New First Responder

People are constantly on the move—particularly in busy transit hubs—and passengers need to know where they should be and by when.

Biometric Ideas

Biometric Ideas

To best leverage the advantages of biometrics, integrators should follow the tips outlined below to take advantage of the primary benefits of biometrics, which are enhanced security and convenience.

Getting A Hold On The Bandwith

More than a decade ago, it was all about analog cameras. My, how times have changed. By 2010, IP-based cameras were taking over the security duties, and doing a good job, but there were challenges.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.