Top Stories


Security Products and Companies in a Country Music Paradise

Security Products and Companies in a Country Music Paradise

ESX 2014 attendees discover best practices, establish key relationships and learn through education tracks that cover industry-specific topics while experiencing classic country music at its finest.

STANLEY Security Showcases PAC Software at DHI CoNEXTions 2014

An innovative and easy-to-use interface allowing local monitoring and management, including photo ID badging for up to 250 entrance points and 25,000 users.

Best Practices for Key Control

Best Practices for Key Control

Key control and asset management technology are reliable and cost-effective methods to improve security by ensuring that facility keys are properly managed with regard to access, storage and tracking.

Omniscient Security Video

Omniscient Security Video

Seeing what’s out there is the beginning of situational awareness. Over the years, video surveillance technology has steadily raised the level of situational awareness available to security teams, and today’s video technologies are pushing the envelope again.

Be Safe in Your Travels

Do you remember that one hotel you’ve stayed at during the course of your travels? You remember the one I’m talking about; it looked good on the outside, but inside, there was no security. It sort of left you feeling weak in the knees hoping nothing bad would happen.

Heartbleed Bug Still Causing Problems after Two Months of Patches

Heartbleed Bug Still Causing Problems after Two Months of Patches

Over 300,000 servers still vulnerable; McAfee offers free detection tool.

Security and Threat Information Exchange Platfom Launched by Microsoft

Security and Threat Information Exchange Platform Launched by Microsoft

Allows quick communication between cybersecurity professionals who respond to cyber threats.

Are Bulletproof Backpacks the Next School Security Trend?

Are Bulletproof Backpacks the Next School Security Trend?

As campus shootings increase across the nation, retailers are stepping up to create bulletproof products.



AT&T Offers Help to Customers Affected by Breach

AT&T Offers Help to Customers Affected by Breach

Total number affected still unknown, but company to offer free credit monitoring.

UK Government Admits Spying Using Google, Facebook, Twitter

UK Government Admits Spying Using Google, Facebook, Twitter

What it all boils down to is internal vs. external cyber communications.

Android Smartphones House Pre-installed Spyware

Android Smartphones House Pre-installed Spyware

Integrated with the smartphone's firmware, it is impossible to remove or disable the malicious app.

Samsung Techwin and Convergint Technologies Announce Strategic Partnership Agreement

Complementary solution delivers industry's top-rated systems.

IFSEC 2014 Opens its Doors to the Security and Fire Industry

IFSEC 2014 Opens its Doors to the Security and Fire Industry

A quick tour through this event shows that there is something for everyone.

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Security Solutions Hone in on Needs of Small to Medium Size Businesses

Crime doesn't discriminate against size; small businesses are typically most vulnerable with fewer resources to guard against it.

Benefits of Key Control are Focus for Morse Watchmans at IFSEC 2014

Key control and management solutions offer state-of-the-art security.

Tri Ed Acquires SecurityPro Warehouse

New Orleans branch moving into 10,000 square foot facility.

Drones: The Future of Bonding with Your Neighbors

Drones: The Future of Bonding with Your Neighbors

Skyteboard 3G, an iOS and Android app-controlled drone, could help facilitate interaction in local communities. (Video Included)

Bitcoin Makes a Come Back to Apple App Store

Bitcoin Makes a Come Back to Apple App Store

As unregulated virtual currencies make their way back into iOS devices, what type of security issues will develop?

GovSec 2014 Attendance Grows 20 Percent

GovSec – the Government Security Conference and Expo, which featured TREXPO, the Law Enforcement Expo, and was held in conjunction with CPM East – saw its conference grow by 20 percent and total attendance reach more than 3,600 in 2014.

STANLEY Security transfers Sonitrol-branded Product Development to 3xLOGIC Inc

Goal is to bring combined strengths of both companies to the development and delivery of the brand.

Morse Watchmans Key Control Systems Improve Security at Wyndham Hamilton Park

KeyWatcher Systems ensure accountability for keys and essential communication devices.

Canon acquires Milestone to Make Major Advance in Network Video Surveillance Business

New combination will create formidable player in market by combining the strengths of Canon’s imaging technology with Milestone’s video management software.

Hacker Behind Bars for Revealing Ex-President’s Bathroom Art

Hacker Behind Bars for Revealing Ex-President’s Bathroom Art

Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.

Combining Technology and People to Increase Security and Awareness

Combining Technology and People to Increase Security and Awareness

4 elements that must be included in a security strategy to gather information from a variety of sources to create heightened security within an organization.

Open University Campuses Do Not Have to Be a Security Nightmare

Open University Campuses Do Not Have to Be a Security Nightmare

How three security professionals in the education vertical are keeping their campuses safe and secure for all.

New Chinese Military Cyberattacks Discovered

New Chinese Military Cyberattacks Discovered

Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.

The Biometric Card - Next Evolution for ID Cards

The Biometric Card - Next Evolution for ID Cards

ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.

Types of Passwords Hackers Use for Their Own Accounts

Types of Passwords Hackers Use for Their Own Accounts

Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?

Smart Hoodie Could Add New Layer of Security

Smart Hoodie Could Add New Layer of Security

GSM radio sewn into sweatshirt allows different gestures to trigger different text messages to be sent to smartphone contact.

SecurityTronix Announces Free Download of Advanced Mobile App

Designed for company's DVRs and Hybrid DVR standalone recorders to allow more control of surveillance system in palm of users hand.

Featured

  • DHS to End ‘Shoes-Off’ Travel Policy

    Homeland Security Secretary Kristi Noem announced a new policy today which will allow passengers traveling through domestic airports to keep their shoes on while passing through security screening at TSA checkpoints. Read Now

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report: 2025 Video Surveillance Market Set to Grow After Small Decline in 2024

    Novaira Insights has unveiled its latest report, “World Market for Video Surveillance Hardware and Software – 2025 Edition.” The research indicates that the global market for video surveillance hardware and software experienced a slight decline of 0.3% in 2024. This performance fell short of previous forecasts, primarily due to a significant decrease of 7.8% in the Chinese market. Conversely, the rest of the world saw a growth of 4.9%. The global market for video surveillance equipment was estimated to be worth $25.0 billion in 2024. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.