Top Stories


Security Badge Abuse at DFW Airport

Security Badge Abuse at DFW Airport

Airport employees sign a piece of paper indicating that they have read and understand the badge rules, so what were these people thinking?

Security Consultant Shares Extensive Knowledge about Active Shooters at ASIS 2013

Security Consultant Shares Extensive Knowledge about Active Shooters at ASIS 2013

Learn what to do before, during and after an active shooter incident at ASIS 2013.

Introducing the New Star of the Bosch HD Portfolio

Introducing the New Star of the Bosch HD Portfolio

DINION starlight and FLEXIDOME starlight cameras provide stellar performance even in extreme, low-light conditions due to content-based imaging technology improving image usability while reducing required bandwidth and storage cost.

Oncam Grandeye names Paul Such as VP Sales Europe and Middle East

Oncam Grandeye names Paul Such as VP Sales Europe and Middle East

Paul brings almost 20 years’ worth of experience to the job, with a specialization in high-growth sales across the security industry.

New Regional Sales Manager for OnSSI in Caribbean and Latin America

New Regional Sales Manager for OnSSI in Caribbean and Latin America

Sergio Sanchez brings wealth of experience and Ocularis knowledge to growing market region.

Wireless Access Links Diverse Buildings

Wireless Access Links Diverse Buildings

With scattered buildings and each with different access control needs, the town of Estes Park, Colo., faced a complicated security situation.

Power to the People

Power to the People

What you don’t know about PoE technology could actually be costing you business. Once you understand its broad usefulness and the numerous applications it supports, the more you realize it’s a perfect fit for an incredible number of customers and vertical markets.

Centralizing Your Video Management Software

The industry-wide migration to IP video surveillance over the last few years has had many benefits, but chief among them may be the ability to centralize.



Safeguarding Assets

Safeguarding Assets

With a history dating back to the 1850s, the Sioux City Public Museum has evolved from its original focus on natural science to a broader emphasis on preserving the area’s heritage, offering a variety of educational programs, events and historical exhibitions valued at more than $2 million.

Technology Game Changer

Technology Game-Changer

According to IBM, 2.5 quintillion new bytes of information are created each day—that’s 1 with 18 trailing zeros. The explosion of “Big Data” has touched every industry. Video surveillance is no exception.

Protecting the Priceless

Protecting The Priceless

The National Museum of Funeral History in Houston houses the country’s largest collection of funeral service artifacts and highlights renowned exhibits on one of man’s oldest cultural customs.

An Eye on Paradise

An Eye on Paradise

Recently, the county implemented an initiative to migrate toward one centralized system for all security, including access control, biometrics and surveillance on its three populated islands, excluding Kahoolawe, which does not have any residents or county buildings.

Cameras Covering the Theatre

Cameras Covering the Theatre

Located in the heart of Hollywood, Calif., The Ricardo Montalbán Foundation Theatre, named after the late actor and performing arts patron, is a venue for diverse cultural events.

What’s in Your BYOD World?

What’s in Your BYOD World?

As network security professionals are acutely aware, they must be continuously vigilant to meet the ever-evolving threats driven by the bring your own device (BYOD) trend that is extending the network outside the office.

Identity, the New Security Perimeter

Identity, the New Security Perimeter

Whether traveling, working from home, in flex offices or a conference room at a home office, we expect information access to be immediate and communication via voice, chat, text or email to be always available.

Put that Knife Back in Your Pocket

A few years ago, someone sent me a little knife that, when you push a lever, the blade flies from inside the stock. It is a wicked little weapon that I had put away and forgot about. I found it during my annual office spring cleaning.

Biometrics on the Move

Biometrics on the Move

Multiple factors of authentication, including biometrics, can increase the probability that a person presenting a card to a reader is the same person who was initially issued the card.

The New Mobility

When I was growing up, one of my favorite comic book characters was Dick Tracy—not the Warren Beatty variety— but the heroic police detective of Sunday newspaper comic strips.

Boosting Legacy Infrastructure

Boosting Legacy Infrastructure

The transition of existing physical security systems, such as fire and burglar alarm or video surveillance systems, to the next generation of technology has never been easier or more affordable than it is today.

The Edge of Intelligence

The Edge of Intelligence

When the first network camera was introduced in 1996, its functionality was pretty bare bones: digitize images and send them across the network to a centralized video management system.

Video Surveillance Products Leader IC Realtime Joins Verizon Partner Program

Video Surveillance Products Leader IC Realtime Joins Verizon Partner Program

Joint national program opens doors for integrators to tap vertical markets by deploying custom-tailored HD video surveillance systems transmitted via Verizon Wireless.

iPhone fingerprint scanner

Rumor has it iPhone is Going Biometric

Less than a year ago, Apple, Inc. whipped out and handed over $356 million to purchase AuthenTec, Inc., a fingerprint sensor technology developer with the technology to embed a fingerprint scanner into the glass of the iPhone (and, iPad for that matter), making it one of the very few public companies acquired by Apple.

Lobby Security for Energy Company Headquarters Provided by Smarter Security

Lobby Security for Energy Company Headquarters Provided by Smarter Security

Fastlane Glassgate 200 Optical Turnstiles selected after successful Fastlane operation for years in previous headquarters.

NICE Situator to be Integrated at Denver International Airport to Enhance Security and Safety

NICE Situator to be Integrated at Denver International Airport to Enhance Security and Safety

The Situator implementation will help DIA better manage its critical security systems and enhance responses to emergencies and other events.

HID Global Drives Initiative for Partners to Develop NFC Trusted Tag Applications

HID Global Drives Initiative for Partners to Develop NFC Trusted Tag Applications

HID Global’s focus areas of use for new applications include authentication of items, secure data management and trusted authorizations.

VMP Features ER 148 Equipment Rack with New ER 148 4PKIT Expansion Kit at 2013 InfoComm

VMP Features ER 148 Equipment Rack with New ER 148 4PKIT Expansion Kit at 2013 InfoComm

The ER-148 is an EIA compliant, 19-inch, steel-constructed, equipment rack with a rail height of 48 inches and 27 available rack spaces; the ER-148-4PKIT expands the 2-post rack to a 4-post rack.

School Safety and Security from Sea to Shining Sea

School Safety and Security from Sea to Shining Sea

Gone are the days when you can simply allow your child to walk to school, play outside in the yard alone or even now, leave them in the “safety” of their own home.

Milestone Announces Vertical Specialist Partner Program

Milestone Announces Vertical Specialist Partner Program

Global initiative aims to increase focus in specific business sectors.

Budgets for Physical Security Equipment are Increasing for End Users

Budgets for Physical Security Equipment are Increasing for End Users

Technology advancements meant that the equipment consumers bought became unsupported too soon by manufacturers.

Top Five Myths About IP Video Solutions in Banking

Online Exclusive: Top Five Myths About IP Video Solutions in Banking

Mobile banking has evolved over time and, if you ask most consumers, it’s something they’ve come to trust and rely on as usage numbers continue to rise. In this article, Stephen Joseph explores the five most common myths of IP solutions in the banking environment.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.