Top Stories


DHS Announces New Cybersecurity Requirements for Critical Pipeline Owners and Operators

DHS Announces New Cybersecurity Requirements for Critical Pipeline Owners and Operators

The Department of Homeland Security’s Transportation Security Administration (TSA) announced a Security Directive that will enable the department to better identify, protect against and respond to threats to critical companies in the pipeline sector.

Body-worn Technology

Body-worn Technology

For better or for worse, the events of the past several years have put law enforcement under a microscope.

Working from Home

Working from Home

There is no way to downplay how COVID-19 has affected the way we live, do business and educate our children. One year into it, and the end is still nebulously off in the distance.

Multiple Dead at San Jose Rail Yard Shooting

Multiple Dead at San Jose Rail Yard Shooting

More than a half dozen people have been shot and killed as a public transit employee open fire on coworkers at a Northern California rail yard this morning. The rail yard is located in downtown San Jose, about 50 miles south of downtown San Francisco.

The new dynamics of security and safety mandates for security entrances

Navigating the Retrofit

Most security managers know that security technology has come a long way in the last few years, and equipment and systems purchased five or 10 years ago will need to be updated or replaced.

Securitas North America Announces Partnership with the National Center for Missing & Exploited Children

Securitas Security Services North America has formed a new partnership with the National Center for Missing & Exploited Children (NCMEC), a private, U.S.-based nonprofit organization focused on finding missing children, reducing child sexual exploitation and preventing child victimization.

70 Percent Of SOC, IT Security Teams Emotionally Overwhelmed By Security Alert Volume

Trend Micro Incorporated recently released results from a new study that reveals SOC and IT security teams are suffering from high levels of stress outside of the working day—with alert overload a prime culprit.

New Fingerprint Technology Can Detect Cocaine Use

New Fingerprint Technology Can Detect Cocaine Use

Dr. Melanie Bailey is a fellow of the Engineering and Physical Sciences Research Council (EPSRC). Her team has identified differences between the fingerprints of people who touched cocaine compared with those who have ingested the drug, even if the hands are not washed.



Alarm Detection Systems Appoints Amy Becker as Chief Operating Officer

Bob Bonifas, Founder and CEO of Alarm Detection Systems, Inc. (ADS), is pleased to announce the appointment of Amy Becker as Chief Operating Officer (COO), effective immediately.

Protecting the Priceless

Protecting the Priceless

Late at night on March 18, 1990, two thieves dressed as police officers — one of them bold enough to sport a false mustache made of wax — talked their way past security guards at the Isabella Stewart Gardner Museum in Boston

Technology counts on AI to authenticate and identify people

Always Surrounded

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives.

Customs and Border Protection Announces Plan to Enhance Rail Cargo Inspections

U.S. Customs and Border Protection (CBP) unveiled a $46 million dollar initiative earlier this month to enhance the security and efficiency of rail cargo inspections at locations throughout the United States.

SALTO Systems Names Ron Shaffer as Business Lead for Education

SALTO Systems has named Ron Shaffer as the North America Vertical Business Leader-Education.

Security Industry Association Announces 2021 Women in Security Forum Scholarship Opportunity

The Security Industry Association (SIA) is now accepting applications for the 2021 SIA Women in Security Forum Scholarship, an initiative developed by the SIA Women in Security Forum.

DoD Needs to Invest More in Innovation

Numerous commissions, studies and papers continue to point to the stifling effects of the DoD procurement system on production, efficiency, and innovation as well as lead to bloated price tags like the F-35.

ONVIF Hosts 23rd Virtual Developers’ Plugfest

ONVIF, a global standardization initiative for IP-based physical security products, in April hosted its 23rd ONVIF Developers’ Plugfest, and second virtual event, testing implementations of six ONVIF profiles as well as two profile release candidates for access control and metadata.

Connected Doesn’t Mean Protected

Connected Doesn’t Mean Protected

When it comes to device and systems connectivity, surge protection solutions can mitigate risk

Advanced Security Presents Gallagher a Supplier of the Year Award

Gallagher’s New Zealand based security team were presented with a Supplier of the Year award at the Advanced Group Supplier Awards evening last week.

DHS Warns of Potential Extremist Attacks as Pandemic Wanes

DHS Warns of Potential Extremist Attacks as Pandemic Wanes

On Friday, May 14, the Department of Homeland Security released a National Terrorism Advisory System bulletin suggesting that as pandemic-related restrictions begin to ease, violent extremist groups may take the opportunity to strike.

Eagle Eye Networks Releases Smarter Business VMS

The right video management system can make an organization smarter and more efficient, as well as more secure. Eagle Eye Networks new guide is useful for businesses—particularly multisite businesses— in evaluating cloud video surveillance systems.

House Democrats Unveil $1.9 Billion Bill to Improve U.S. Capitol Security

House Democrats Unveil $1.9 Billion Bill to Improve U.S. Capitol Security

House Democrats unveiled on Friday a $1.9 billion bill to improve Capitol Hill security after the January 6 insurrection.

Cameras: They Don’t Work

For all the talk of Safe Cities, and correct camera placement, it all comes to naught if the cameras don’t work. Dallas police investigators found this to be the case in a popular weekend area where younger groups of people mingle, well into the morning hours.

Report: Colonial Pipeline Paid Almost $5 Million to Hackers

Report: Colonial Pipeline Paid Almost $5 Million to Hackers

Colonial Pipeline paid the Eastern European hackers who attacked its network 75 Bitcoin, worth almost $5 million at the time of the ransom payment.

Survey Finds Americans Are Concerned About Mental Health and Want Public Safety Agencies to Improve Response to Mental Health Crises

Survey Finds Americans Are Concerned About Mental Health and Want Public Safety Agencies to Improve Response to Mental Health Crises

The findings show that Americans are concerned about mental health generally and want to see first responders, including 911 call takers, police, EMS and fire fighters, improve emergency response involving mental health crises.

An Uptick in Travel Brings Demand for Integrated Security

An Uptick in Travel Brings Demand for Integrated Security

A predicted boom in U.S. travel this summer will lead to increased demand for integrated video, access, and systems in hospitality and leisure settings, so says IDIS America.

Access Control Partnership Announced

Alcatraz AI and Netronix Integration today announced a strategic partnership to expand their access control solutions to security business users.

ESX 2021 Announces Virtual Experience for June Event

The 2021 Electronic Security Expo (ESX), presented by Electronic Security Association (ESA), has released the full educational lineup for its upcoming Virtual Experience, which will take place online from June 15-17.

Security Industry Association Announces Cybersecurity Certification for the Security Industry

The Security Industry Association (SIA) has announced the creation of the Security Industry Cybersecurity Certification (SICC), a new industry credential developed by SIA with support from PSA Security Network and Security Specifiers and the first-ever certification focused specifically on cybersecurity and physical security convergence.

Colonial Pipeline Will Probably Not Have to Pay Ransom to Hackers

The ransomware attack forced the company to shut down its pipeline and has caused fuel shortages on the East Coast.

Interface Security Systems Appoints Brian Garavuso as CTO

Interface Security Systems has announced the appointment of Brian Garavuso as its chief technology officer.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.