Top Stories


Openpath Launches Digital Badging Capabilities to Revolutionize Access Control

Openpath has reimagined the ideal digital badge for today’s modern workforce and workplace.

Kevin Darnell Joins Hanwha Techwin to Drive Retail Business in North America

Hanwha Techwin has announced that Kevin Darnell has joined the company as retail business development manager for the retail sector in North America.

COVID-19: The Second Wave

COVID-19: The Second Wave

The second wave is here, and people are tired of the pandemic as we head into what will most likely be a long, dark winter with COVID-19. Campuses of all sizes need to function at some level or risk an uncertain future.

Alejandro Mayorkas Sworn in as Secretary of Homeland Security

Alejandro Mayorkas Sworn in as Secretary of Homeland Security

On Feb. 2, Alejandro Mayorkas was officially sworn in as the seventh Secretary of Homeland Security.

Concentric Extends Industry’s Most Comprehensive Zero Trust Data Access Governance Solution with Unique User-Oriented View into Risk and Activity

Company’s AI-based capabilities uniquely include data discovery, risk monitoring and data protection across structured and unstructured on-premises and cloud data repositories

BriefCam names Igal Dvir as Vice President of Technology, Product

BriefCam has announced the appointment of Igal Dvir as vice president of Technology and Product. In this newly created role, Dvir will oversee product vision, strategy and roadmap execution to drive company-wide innovation.

Mobile Healthcare Apps are Leaking Sensitive Patient Data

A new study shows that popular mobile health applications are potentially compromising millions of patients, potentially exposing social security numbers, addresses, birthdates, allergies, medications and other sensitive data.

HID Global Acquires Technology Solutions (UK) Ltd

HID Global has announced that it has acquired Technology Solutions (TSL) UK Ltd, a global provider of radio frequency identification (RFID) handheld readers.



The Future of Video Security

Even before the pandemic, cloud computing was flourishing. It is nearly impossible today to find an organization that doesn’t use some form of cloud service. From applications to operating systems, to web servers, storage, and virtual LANs — an almost infinite array of solutions can be found in the cloud.

Master Lock Celebrates 100 Years

Global safety and security leader reveals year-long celebration details and new user-led innovation to commemorate milestone

Survey Finds Lack of Trust in Information Public Receives from Local Officials, Low Level of Confidence in Vaccine Rollout

Rave Mobile Safety’s report highlights what local officials and first responders need to know to address pressing emergency communication challenges.

Mission 500 Announces Call for Nominations for 2021 Corporate Social Responsibility and Humanitarian Awards

Mission 500, a non-profit charitable organization focusing on the security industry and dedicated to serving children and families in need across the United States, is now accepting nominees for their 2021 Corporate Social Responsibility (CSR) Award and 2021 Humanitarian Award.

To the Next Level

To the Next Level

Security and surveillance solutions must be able to quickly, accurately and reliably identify potential threats so that security staff can promptly respond.

Versa SASE Delivers Success to Real-World Customers through Increased Security and Performance with Significant Cost and Time Savings

Versa Networks has announced that feedback from Versa SASE customers and partners reveals its comprehensive integrated architecture delivers improved security and performance with significant cost and time savings over competing disparate solutions which stitch together security, routing, and SD-WAN.

A Quality of Life

When the number of people working from home rapidly increased in the spring of 2020, organizations everywhere had to adapt quickly.

Bringing Trust to the Workplace

Bringing Trust to the Workplace

As businesses and governments enter a new era of workplace safety, two prerequisites are preparedness and the ability to pivot quickly.

Front Line Security at Risk

If I Knew Yesterday What I Know Today

Although I work in software now, I oversaw the marketing for a manufacturing company in another life.

Focus on Physical and Cyber Linkages

Focus on Physical and Cyber Linkages

All the discussions in recent years about the “convergence” of physical and cyber security have fallen short in one crucial area.

Digital Technologies Create Savings

Digital technologies are transforming all aspects of life today, yet sectors such as the criminal justice system continue to be slow to adapt and are failing to take advantage of a wealth of innovations available at the moment.

Outside the Walls

Outside the Walls

When it comes to video surveillance for outdoor use, security solutions often require specialized camera technology to be effective and maximize monitoring capabilities.

The How and Why

Current RFID devices, particularly those operating at 125 kHz, are not suitable for secure identification. Proximity credentials that operate at 125 kHz are vulnerable to cloning.

A True Calling

A True Calling

If the pandemic has taught us anything, it’s that secure remote access to systems is no longer a “nice to have” feature.

A Technology Advancement

It is amazing that the year of convergence from analog to IP was supposed to be 2008 but it was not until 2012 that IP-cameras started to outsell analog cameras. We sure have come a long way from those analog-oriented days.

The New Age

The New Age

During the early days of the COVID-19 pandemic, commercial passenger air travel in the United States dropped by more than 90%.

Grooming the Landscape

The explosion of IoT devices in today’s technology landscape makes a perfect storm for attackers to exploit.

cybersecurity map

Timing Isn't Everything But It Helps

Many lessons were learned in enterprise IT and security teams in 2020, right down to the final weeks of the year with the Solarwinds attack. We closed out a miserable year with a devastating reminder about the danger of third party access and supply chain attacks.

DHS Issues a National Terrorism Advisory System (NTAS) Bulletin

DHS Issues a National Terrorism Advisory System (NTAS) Bulletin

The Acting Secretary of Homeland Security has issued a National Terrorism Advisory System (NTAS) Bulletin today after consultation with the intelligence community and law enforcement partners. There is currently a heightened threat environment across the United States that is likely to persist over the coming weeks.

Genetec Broadens its Access Control Offering for Government Customers

Genetec Inc. has announced that it is broadening its portfolio of FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis™ access control system with support of Veridt Stealth access control readers.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.