Facility Security


Florida Schools Receive Threatening Extortion Email

Florida Schools Receive Threatening Extortion Email

Last Tuesday, college and university presidents across Florida received a 1,250-word extortion email threatening violence.

Three Pillars of Sports Venue Security

Three Pillars of Sports Venue Security

Stadium security has gotten a lot more complicated than apprehending seat jumpers, defusing confrontations and ejecting rowdy fans for imbibing one too many beers.

A Cultural Blending

A Cultural Blending

The concept of “securing security” emerged when physical security was being affected by cybersecurity attacks.

Malware Targets Industrial Safety Systems

Security firm FireEye disclosed Thursday the existence of a malware used to compromise industrial control systems and disable their safety systems to potentially cause physical damage.

2 Killed in Shooting at New Mexico High School

2 Killed in Shooting at New Mexico High School

Two students and the suspected shooter were killed in a shooting Thursday morning at Aztec High School in Aztec, N.M.

City Asks Hawaii Hospital to Include Security Measures in Renovation

City Asks Hawaii Hospital to Include Security Measures in Renovation

The request comes after the escape of a psychiatric patient from the facility in November.

Execution of Security Protocols Prevents Tragedy at Hospital

Execution of Security Protocols Prevents Tragedy at Hospital

The gunman was the only person injured and no shots were fired inside the hospital.

Festive Security

Festive Security

The 300,000 person Fremont Festival of the Arts, one of the largest street festivals west of the Mississippi River and toted as California’s premiere art, wine and music festival, is no small undertaking. The threat of an attack is a real possibility.



Real Time Crime Center Opens in New Orleans

Real Time Crime Center Opens in New Orleans

The center, which cost more than $5 million, is part of a citywide public safety plan.

Best Practices for Deploying PSIM Quickly and Efficiently

Best Practices for Deploying PSIM Quickly and Efficiently

No enterprise can eliminate 100% of its risk. Instead, the security objective must be to understand all risks and to effectively manage and mitigate them.

Shooting Spree in California Involves Elementary School

UPDATE: Gunman in California Shooting Spree Stopped by Lockdown Procedures

Tehama County Sheriff says five people are dead, including the gunman, following a shooting spree in California.

More Schools Interested in Bulletproof Products

More Schools Interested in Bulletproof Products

As instances of mass shootings increase, particularly at “soft targets,” the interest in bulletproof products increases, with one Florida school now offering bulletproof backpack panels.

Churches Around the Country Revaluate Security Following Church Massacre

Churches Around the Country Reevaluate Security Following Church Massacre

The mass shooting at a South Texas church during services Sunday has many churches across the country reevaluating their security.

26 Dead in South Texas Church Shooting

26 Dead in South Texas Church Shooting

The incident, which took place in a small community about 40 miles outside of San Antonio, has been called the largest mass shooting in Texas history.

6 Dead, 15 Injured after Vehicle Attack in Lower Manhattan

UPDATE: 8 Dead, 11 Injured after Vehicle Attack in Lower Manhattan

A suspect drove a rental truck down a bike path striking people in it's path.

3 People Killed In Colorado Walmart Shooting

3 People Killed In Colorado Walmart Shooting

Three people are dead after a man open fires in a Walmart.

Keeping the Stars Aligned

Multi-tenant buildings present security challenges not found in single-user facilities. Tenants may come and go at different times.

Its Not Just A Turnstile

Its Not Just A Turnstile

Many professionals in the security industry today tend to use the word “turnstile” to refer to all security entrances, when, in fact, there are actually multiple types of entrances for different applications, industries and levels of security.

3 Common Misconceptions About Business Security Systems

3 Common Misconceptions About Business Security Systems

When you can secure the building at night, you can open your business for a lucrative tomorrow.

Three Technologies That Will Change Your Business

3 Security Technologies to Invest Time in Researching

How researching and investing in these three technologies will change your business

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”