Top Stories


Drones: The Future of Bonding with Your Neighbors

Drones: The Future of Bonding with Your Neighbors

Skyteboard 3G, an iOS and Android app-controlled drone, could help facilitate interaction in local communities. (Video Included)

Bitcoin Makes a Come Back to Apple App Store

Bitcoin Makes a Come Back to Apple App Store

As unregulated virtual currencies make their way back into iOS devices, what type of security issues will develop?

GovSec 2014 Attendance Grows 20 Percent

GovSec – the Government Security Conference and Expo, which featured TREXPO, the Law Enforcement Expo, and was held in conjunction with CPM East – saw its conference grow by 20 percent and total attendance reach more than 3,600 in 2014.

STANLEY Security transfers Sonitrol-branded Product Development to 3xLOGIC Inc

Goal is to bring combined strengths of both companies to the development and delivery of the brand.

Morse Watchmans Key Control Systems Improve Security at Wyndham Hamilton Park

KeyWatcher Systems ensure accountability for keys and essential communication devices.

Canon acquires Milestone to Make Major Advance in Network Video Surveillance Business

New combination will create formidable player in market by combining the strengths of Canon’s imaging technology with Milestone’s video management software.

Hacker Behind Bars for Revealing Ex-President’s Bathroom Art

Hacker Behind Bars for Revealing Ex-President’s Bathroom Art

Attempting to keep a low-profile after leaving the White House, George W. Bush didn't bargain on his most private room being revealed to the public.

Combining Technology and People to Increase Security and Awareness

Combining Technology and People to Increase Security and Awareness

4 elements that must be included in a security strategy to gather information from a variety of sources to create heightened security within an organization.



Open University Campuses Do Not Have to Be a Security Nightmare

Open University Campuses Do Not Have to Be a Security Nightmare

How three security professionals in the education vertical are keeping their campuses safe and secure for all.

New Chinese Military Cyberattacks Discovered

New Chinese Military Cyberattacks Discovered

Hackers targeting golfers at conferences, US government sectors along with American, European and Japanese satellite, aerospace and communication companies.

The Biometric Card - Next Evolution for ID Cards

The Biometric Card - Next Evolution for ID Cards

ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.

Types of Passwords Hackers Use for Their Own Accounts

Types of Passwords Hackers Use for Their Own Accounts

Since hackers bust through networks on a daily basis, it would make sense that they are password-generating superstars, but are they?

Smart Hoodie Could Add New Layer of Security

Smart Hoodie Could Add New Layer of Security

GSM radio sewn into sweatshirt allows different gestures to trigger different text messages to be sent to smartphone contact.

SecurityTronix Announces Free Download of Advanced Mobile App

Designed for company's DVRs and Hybrid DVR standalone recorders to allow more control of surveillance system in palm of users hand.

Privacy Concerns about Student Data Meets Big Parents

Privacy Concerns about Student Data Meets Big Parents

Parents of school children are standing up against Big Data when it comes to their children's personal information.

DRS Technologies' WatchMaster Thermal Camera Portfolio Now Available On Leading Building Design Software System

DRS Technologies Inc., a Finmeccanica Company, announced recently that its WatchMaster thermal camera specifications will be available to building designers using Autodesk Seek, a leading Building Information Modeling (BIM) web application accessible to Autodesk Revit users.

School Bully Changes His Ways with the Help of His Parents

School Bully Changes His Ways with the Help of His Parents

A second grader at Tournament Hills Elementary in Beaumont, California demonstrates what it means to go from bully to friend. (Awesome video included; a true must-see!)

Gunman Stopped by Students

Gunman Stopped by Students

Just a week before the end of the school year, a lone gunman riddles students with fear on Seattle Pacific University's campus.

How Safe are Your Secrets Online?

How Safe are Your Secrets Online?

Ways to make yourself a hard target by recognizing online vulnerabilities and ways to strengthen your defenses.

China to Punish Google, Apple and Microsoft for Spying

China to Punish Google, Apple and Microsoft for Spying

China's People's Daily, a state-operated media outlet, promises punishments as translated by Reuters.

Scan Wallpaper to Download Ebooks

Scan Wallpaper to Download Ebooks

Vodafone Romania and furniture retailer MobExpert merge the physical and digital world of reading, encouraging the use of mobile data.

The Token-less Solution to Eradicating Passwords

The Token-less Solution to Eradicating Passwords

In a world where security measures are always changing, but to date, have failed to keep our identities safe, what is the best way to keep our personal material truly secure?

SecurityTronix Announces HD-COAXINATOR Series

Series of high definition cameras and CVR digital video recorders that use the same coaxial cable, connectors and power plugs as a traditional analog CCTV system.

ONVIF and SIA Announce Memorandum of Understanding on Access Control Standards

Partnership within the security industry furthers the development of IP-based interoperability standards.

CBC AMERICA Corp Announces Promotion of Victor Milani

Former director, business development promoted to vice president, corporate strategy.

iOS 8 Adds TouchID Support for All Apps

iOS 8 Adds TouchID Support for All Apps

Just imagine unlocking your phone, buying apps and giving other apps permission to use your phone's fingerprint scanner for authentication.

Bicycle Thieves in San Francisco Could Become Twitter Celebrities

Bicycle Thieves in San Francisco Could Become Twitter Celebrities

City uses modern tools to crack down on bike thievery enabling police officers to make on-the-spot arrests.

IdentiSys Acquires Photo ID Systems and Supplies

Identification, emergency response, security solutions and on-site service provider expands Ohio customer base.

Cargo Theft: 2013 in Review

Cargo Theft: 2013 in Review

Analysis of Supply Chain – Information Sharing & Analysis Center Annual Report

3 Ways to Increase Profitability Using Video Surveillance with Analytics

For the past three decades, video surveillance has proven itself beneficial in helping businesses reduce costs, stop losses and increase productivity. However, these systems either require additional manpower to monitor video feeds live, or are only used to review recorded video, after the fact.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.