Top Stories


Honeywell Welcomes Apex Investigation and Security Inc. as Authorized Dealer

Recognized, family-owned business provides wide range of security technologies.

Billion Dollar Cyberheist Caused By Phish-prone Employees

KnowBe4 urges US institutions to take effective action to train employees before they fall victim to phishing attacks.

L-3 Security & Detection Systems Receives Order from German Ministry of the Interior

Airports install 100 ProVision ATD and ProVision 2 security scanners for primary screening.

Milestone Certifies BCDVideo Nova Series on XProtect

Certified video surveillance storage system among “best ever tested."

Video Footage May Prove Unethical Behavior on Tradeshow Floor

Video Footage May Prove Unethical Behavior on Tradeshow Floor

LG accused of damaging four Samsung Crystal Blue washing machines in Berlin.

U.S. Sees Major Q4 Spikes in Cargo Thefts

U.S. Sees Major Q4 Spikes in Cargo Thefts

Highlighting the hotsheet.

Security Guard Killed inside Marijuana Dispensary

Security Guard Killed inside Marijuana Dispensary

The guard was shot and killed during an attempted robbery.

The Bradford City Fire Disaster

The Bradford City Fire Disaster

UK steel glazing company has supplied fire-rated systems to several Olympic, FIFA and other major stadiums.



Obama Recruiting Tech Companies for Cybersecurity

Obama Recruiting Tech Companies for Cybersecurity

Executive actions aim to increase information sharing among private sector companies and federal law enforcement.

Samsung SmartTVs May Record Conversations

Samsung SmartTVs May Record Conversations

A line in the privacy policy states the television may record conversation and send it to a third party.

Axis Unanimously Accepts Bid from Canon

Canon Inc. has announced a public offer to the shareholders of Axis to transfer all of their shares in Axis to Canon. The total value of the offer is SEK 23.6 billion

New Report Finds Security Gaps in Vehicle Technology

New Report Finds Security Gaps in Vehicle Technology

A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.

US Navy Introduces Firefighting Robot

US Navy Introduces Firefighting Robot

SAFFiR and his drone sidekick, Damage Control Technologies, help keep sailors out of direct exposure to fire.

Obama’s Security Strategy Features Robust Leadership, Limitations

Obama’s Security Strategy Features Robust Leadership, Limitations

The President’s second, and final, national security strategy focuses on limiting how much the United States can shape world events.

VITEK to Sponsor ESA Leadership Summit in Phoenix This Month

Company representatives to share information on latest in video surveillance and products.

How Safe is Taxpayer Data?

How Safe is Taxpayer Data?

Several technologies are available that help detect misuse of taxpayer information.

France Refuses to Fuel the Fire of Terrorism

France Refuses to Fuel the Fire of Terrorism

Filming action movies on Paris streets banned in response to recent terrorist attacks.

Anthem Blue Cross Hacked, Affecting Millions

Anthem Blue Cross Hacked, Affecting Millions

The health insurance company is working with the FBI to come to a solution.

New Altronix Outdoor Solution

Enables long range Ethernet over Coax or CAT5e and supports Hi-PoE and PoE/PoE+ at longer distances.

Milestone Systems Makes Newborn Rhino an Online Star

First result of a strategic collaboration with Milestone on video-enabled experience in parks.

Video Insight to Donate $1,000,000 in Video Surveillance Systems To Schools and Colleges

Video surveillance isn't a luxury; it's a necessity.

Vector Security Now Accepting Applications for 2015 LPF Scholarships

Company continues commitment to furthering loss prevention education.

Digital Watchdog Course Qualifies for ESA Credit

ESA-certified DW Spectrum IP VMS classes available for 2015.

Contactless Payment and US Chip-and-PIN Adoption Drives Smart Card Growth in 2014

Smart Payment Association announces preliminary finds of 2014 smart card payments review.

Security and Privacy for Wearables Not So Good

Security and Privacy for Wearables Not So Good

By 2019, it is predicted that more than half a billion wearable devices will be in use each day.

Few Criminal Background Checks are run at Airports

Few Criminal Background Checks are run at Airports

Officials have admitted that it is a gap in security.

Google Adds Two New Initiatives to Security Rewards Programs

Google Adds Two New Initiatives to Security Rewards Programs

Paid out more than $1.5 million in 2014.

Panasonic Acquires Video Insight

Goal is to strengthen North American education market.

Featured

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.