Facility Security


Florida Schools Receive Threatening Extortion Email

Florida Schools Receive Threatening Extortion Email

Last Tuesday, college and university presidents across Florida received a 1,250-word extortion email threatening violence.

Three Pillars of Sports Venue Security

Three Pillars of Sports Venue Security

Stadium security has gotten a lot more complicated than apprehending seat jumpers, defusing confrontations and ejecting rowdy fans for imbibing one too many beers.

A Cultural Blending

A Cultural Blending

The concept of “securing security” emerged when physical security was being affected by cybersecurity attacks.

Malware Targets Industrial Safety Systems

Security firm FireEye disclosed Thursday the existence of a malware used to compromise industrial control systems and disable their safety systems to potentially cause physical damage.

2 Killed in Shooting at New Mexico High School

2 Killed in Shooting at New Mexico High School

Two students and the suspected shooter were killed in a shooting Thursday morning at Aztec High School in Aztec, N.M.

City Asks Hawaii Hospital to Include Security Measures in Renovation

City Asks Hawaii Hospital to Include Security Measures in Renovation

The request comes after the escape of a psychiatric patient from the facility in November.

Execution of Security Protocols Prevents Tragedy at Hospital

Execution of Security Protocols Prevents Tragedy at Hospital

The gunman was the only person injured and no shots were fired inside the hospital.

Festive Security

Festive Security

The 300,000 person Fremont Festival of the Arts, one of the largest street festivals west of the Mississippi River and toted as California’s premiere art, wine and music festival, is no small undertaking. The threat of an attack is a real possibility.



Real Time Crime Center Opens in New Orleans

Real Time Crime Center Opens in New Orleans

The center, which cost more than $5 million, is part of a citywide public safety plan.

Best Practices for Deploying PSIM Quickly and Efficiently

Best Practices for Deploying PSIM Quickly and Efficiently

No enterprise can eliminate 100% of its risk. Instead, the security objective must be to understand all risks and to effectively manage and mitigate them.

Shooting Spree in California Involves Elementary School

UPDATE: Gunman in California Shooting Spree Stopped by Lockdown Procedures

Tehama County Sheriff says five people are dead, including the gunman, following a shooting spree in California.

More Schools Interested in Bulletproof Products

More Schools Interested in Bulletproof Products

As instances of mass shootings increase, particularly at “soft targets,” the interest in bulletproof products increases, with one Florida school now offering bulletproof backpack panels.

Churches Around the Country Revaluate Security Following Church Massacre

Churches Around the Country Reevaluate Security Following Church Massacre

The mass shooting at a South Texas church during services Sunday has many churches across the country reevaluating their security.

26 Dead in South Texas Church Shooting

26 Dead in South Texas Church Shooting

The incident, which took place in a small community about 40 miles outside of San Antonio, has been called the largest mass shooting in Texas history.

6 Dead, 15 Injured after Vehicle Attack in Lower Manhattan

UPDATE: 8 Dead, 11 Injured after Vehicle Attack in Lower Manhattan

A suspect drove a rental truck down a bike path striking people in it's path.

3 People Killed In Colorado Walmart Shooting

3 People Killed In Colorado Walmart Shooting

Three people are dead after a man open fires in a Walmart.

Keeping the Stars Aligned

Multi-tenant buildings present security challenges not found in single-user facilities. Tenants may come and go at different times.

Its Not Just A Turnstile

Its Not Just A Turnstile

Many professionals in the security industry today tend to use the word “turnstile” to refer to all security entrances, when, in fact, there are actually multiple types of entrances for different applications, industries and levels of security.

3 Common Misconceptions About Business Security Systems

3 Common Misconceptions About Business Security Systems

When you can secure the building at night, you can open your business for a lucrative tomorrow.

Three Technologies That Will Change Your Business

3 Security Technologies to Invest Time in Researching

How researching and investing in these three technologies will change your business

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.