Top Stories


HID Trusted Tag Services Enable iZipline's Internet of Things Platform to Deliver

iZipline embeds HID Trusted Tag Services into its cloud-based platform to eliminate counterfeiting and enhance engagement between global brands and consumers’ mobile devices.

Winning Commercial Intrusion Systems

Simultaneously support UL Commercial Wireless, and addressable and conventional devices.

ONVIF Launches Education, Enforcement Campaign to Ensure Product Conformance

Initiative aims to further protect the ONVIF brand and more preemptively monitor ONVIF’s copyrights, trademarks and logos on an ongoing basis.

7 Things Security Professionals Can Learn from Robin Williams

7 Things Security Professionals Can Learn from Robin Williams

Movie quotes offer great insights and knowledge to enhance the security industry.

North Shore-LIJ Health System Chooses Perspective by PPM

New incident management system to be implemented across 16 award-winning hospitals.

Cabletronix and NACE Release Brand New HDMI Based Switcher and Matrix Solutions

Both feature 4K compatibility to work with the most current high definition technology and standards.

All 11 Members of Catalyst AV Distribution Network Now Selling Nest

Nest is a key element in this specialty product distribution network’s portfolio of best-of-breed wireless technologies that help integrators tap new and/or previously unforeseen revenue opportunities within the home



Migrant Mothers and Children Pose National Security Threat

Migrant Mothers and Children Pose National Security Threat

Department of Justice is upholding 2003 ruling from former Attorney General John Ashcroft in response to 9/11.

Ensuring Fleet Operations Don

Ensuring Fleet Operations Don't Become a Runaway Vehicle

Acquire data to recognize where the issues are and then create a system to train employees to avoid risk.

Anixter International Inc. Announces the Acquisition of Tri-Ed

Accelerates Anixter’s strategic security growth initiative, significantly advancing their existing capabilities and footprint.

USC Student Death Prompts Security Upgrades

USC Student Death Prompts Security Upgrades

Safety includes safety practices and methods and people being aware of their surroundings.

Security Holes Found in some DLP Products

Security Holes Found in some DLP Products

Two researchers planned to reveal their findings at Black Hat USA.

Speco Technologies Brings Award Winning Intensifier Technology to IP

Cameras display color images at night in HD without IR LEDs.

College Deploys Latest SILENT KNIGHT Technologies in Renown Fire Engineering Program

Complete and fully-functional Silent Knight Fire Alarm and Emergency Communication System serves critical training role in Delaware Tech Fire Engineering Lab.

New Samsung Heat-map Analytic Solution Improves Retail Operations and Customer Service

Analyzes movement in a scene to provide a graphical representation of the areas where the most activity occurred.

Taking HD Video Surveillance to the Extremes

Bosch MIC IP 7000 HD family goes IP, captures relevant details in the harshest environments 24/.

Voltage SecureData z/Protect Provides Reliable, Standards-based Protection

Breakthrough encryption and tokenization technologies deliver a new level of safety in today’s risk-prone, online transactional world.

Homeless Woman at San Jose Airport Boards Plane without a Ticket

Homeless Woman at San Jose Airport Boards Plane without a Ticket

Airport responded that the stowaway posed no security threat because she passed TSA screening.

U.S. Homeland Security Contractor Acknowledges Computer Breach

US Homeland Security Contractor Acknowledges Computer Breach

The company says it has all the markings of a state-sponsored attack.

Facebook Follows its Users across Cyberspace

Facebook Follows its Users across Cyberspace

4 ways to battle this social media giant to beat them at their own game.

Hackers steal 1.2 billion Usernames and Passwords

Hackers Steal 1.2 Billion Usernames and Passwords

Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.

Making a Cultural Shift

Making a Cultural Shift

Hospitals operate 24/7. As a result, countless numbers of people enter and exit their facilities. In order to provide a safe environment for their patients and employees, they need to know who these people are and why they are there.

Quantum Secure Debuts SAFE for Secure Cloud

SaaS solution makes SAFE accessible to SMB users and resellers.

Allegion to Feature New ENGAGE Technology-enabled Schlage Wireless Electronic Locks at ASHE

Allows healthcare organizations to easily migrate from mechanical locks to electronic access control.

Proximex Delivers Surveillint Essentials

This fast deploying, PSIM value solution helps customers to easily integrate and monitor their entire security environment.

LENSEC to Demonstrate Perspective VMS at ASIS 2014

LENSEC representatives will show new features of Perspective Video Management Software.

Google Turns in Man with Child Porn

Google Turns in Man with Child Porn

The internet company found illegal images in his Gmail account.

Application Single Sign-on – Benefits and Considerations

Application Single Sign-on – Benefits and Considerations

Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.

Featured

  • DHS to End ‘Shoes-Off’ Travel Policy

    Homeland Security Secretary Kristi Noem announced a new policy today which will allow passengers traveling through domestic airports to keep their shoes on while passing through security screening at TSA checkpoints. Read Now

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report: 2025 Video Surveillance Market Set to Grow After Small Decline in 2024

    Novaira Insights has unveiled its latest report, “World Market for Video Surveillance Hardware and Software – 2025 Edition.” The research indicates that the global market for video surveillance hardware and software experienced a slight decline of 0.3% in 2024. This performance fell short of previous forecasts, primarily due to a significant decrease of 7.8% in the Chinese market. Conversely, the rest of the world saw a growth of 4.9%. The global market for video surveillance equipment was estimated to be worth $25.0 billion in 2024. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.