Top Stories


Chip-enabled Credit Cards Not the Answer to Security Vulnerabilities

Chip-enabled Credit Cards Not the Answer to Security Vulnerabilities

Cost is in the billions but only addresses a narrow range of security issues.

Security flaw from the ‘90s is still a problem today

Security flaw from the '90s is still a problem today

The flaw leaves Apple and Android users vulnerable.

Utah System of Higher Education Requests $2 Million for Security

Utah System of Higher Education Requests $2 Million for Security

Higher education leaders are asking the state for more money to help protect universities from IT security threats.

Monitoring Student

Monitoring Student's Locations via the School Bus

Tracking students before and after school gives all adults involved in the safety and security of students peace of mind.

Scammers Taking Advantage of Apple Pay

Scammers Taking Advantage of Apple Pay

Criminals are using the platform to buy goods with stolen identities and credit cards

Monitoring Student's Locations via the School Bus

Tracking students before and after school gives all adults involved in the safety and security of students peace of mind.

ASSA ABLOY Reveals Strategic Initiative to License Seos

Mobile access solutions built on the Seos platform simplify life by eliminating the need for multiple physical credentials.

Honeywell Launches Entry-level PIR

False alarm-reducing sensor combines value with high performance for residential installations.



UniKeys Smart Access Control App Integrates into Samsung KNOX

Collaboration allows Samsung KNOX customers to gain secure, convenient, touch-to-open, keyless and cardless entry for consumers and businesses through UniKey's global platform.

Hikvision USA Awarded Vendor of the Year by ADI

Testament to strong relationships dedicated to growing the video surveillance market.

Ganz Introduces Transmission Product Line

Complete line of Ethernet transmission products round out line of IP cameras, recording devices and monitoring products.

Costar Video Systems Unveils Website Redesign

With consistent increases in mobile and tablet traffic, it was time for an upgrade.

SureView Systems Announces Integration with AMAG Technology

Immix platform integrates with Symmetry access control software.

Properly Trained School Security Guards

Properly Trained School Security Guards

Suggestions for what to include in a school security guard curriculum.

Secret Service Investigating Two White House Security Breaches

Secret Service Investigating Two White House Security Breaches

The Secret Service is investigating two separate instances that have occurred in the last 24 hours.

Securing Access Control

Just watching the news each night is reason enough to explain why security professionals worry about the security of their access control systems. If the card system is hacked, there can be major problems.

Integrating Security - Logistics company takes advantage of information management solutions

Integrating Security

The logistics company wanted a single solution to provide high-resolution video images as well as the ability to monitor, verify and restrict access to the facility in order to better manage employee time and attendance while also reducing theft and misplacement of inventory.

How an Interruption Sparked an Industry Trend - Key management systems developed to store, track sensitive keys

How an Interruption Sparked an Industry Trend

There are hundreds, if not thousands, of selfhelp sales books on the market offering advice for everyone from the beginner through to the seasoned sales veteran. A primary concept behind all of them is how best to get a foot in the door in order to pitch your product and show how this product will help solve the customer’s problem.

Now Trending

Our homes are becoming living, breathing, speaking organisms a buzz with device-controlled door locks, thermostats, shades, video cameras, garage doors, etc.

Changing the Landscape - Wireless intrusion makes a big splash in commercial applications

Changing the Landscape

Wireless intrusion solutions have been perceived as complicated systems with time-consuming installs, and the possibility for strong interference and constant on-site maintenance. However, as technology continues to advance, it has changed the landscape of wireless intrusion and opened the door for commercial applications—making wireless intrusion not only a viable option, but an ideal solution.

Bring on the Power - Understanding that PoE impacts network design

Bring on the Power

When selecting a PoE switch for an IP surveillance network, system integrators should be aware that not all switches are created equal. PoE switch manufacturers offer a variety of different features that can impact functionality and pricing.

Making Recommendations - Manufacturer provides more successful training experiences

Making Recommendations

After more than 10 years of offering technical training on our physical security entrance products to integrators, installers, and distributors, we’ve refined our approach to a fully developed program that offers a mix of online webinar training, onsite training and in-house factory training.

Slain TSA Officer Honored

Slain TSA Officer Honored

It was recently revealed that Congress, as a whole, has an approval rating of about 12 percent.

Safe and Secure

Safe and Secure

Jumping into the security industry was a calculated and well-planned venture for Quantum Secure. In fact, company president and CEO, Ajay Jain, walked a few tradeshows and talked to potential customers before making the leap.

Who is Servicing Your Clients?

A phrase I continually use is the “lifecycle management of security systems.” Every system, whether integrated or not, will need maintenance at some point throughout its life.

Keeping Sales at Full Strength - Successful companies look for full-time, year round staff

Keeping Sales at Full Strength

There’s no question about the importance of skilled salespeople to any successful security dealer. Without a rep that can get in the door or establish a rapport with a potential customer over the phone, there are no sales.

Intelligence on the Edge - Do you have an App for that?

Intelligence on the Edge

In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications.

Border Checkpoints Go High Tech - Science fiction is quickly becoming science fact

Border Checkpoints Go High Tech

Imagine this: You’re looking around the room and people are getting retinal scans. Others are presenting RFID cards. Some are undergoing fingerprint imaging. Did you accidentally walk onto the set of some futuristic blockbuster movie? Guess again.

Perimeter Benefits - The world of physical security has changed in response to the pervasive threat of terrorism around the globe.

Perimeter Benefits

Most everyone is aware that crash-rated, anti-terrorist vehicle access control barriers, barricades, bollards and gates are standard security tools at government facilities, from embassies to courthouses and capitols to a host of other locales.

A City Wide Approach to Security - San Francisco Metropolitan Transit Agency unifies security in new command center

A City Wide Approach to Security

San Francisco Municipal Transportation Agency (SFMTA) was in need of a solution to maximize the use of their CCTV cameras deployed in the transit system, including the buses, trains and subways.

Featured

  • New Research Reveals Global Video Surveillance Industry Perspectives on AI

    Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency. Read Now

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.