Government


California Bans Weak Passwords in Connected Devices

California Bans Weak Passwords in Connected Devices

California has passed a law that sets higher standards for passwords.

Capitol Increases Securty Following Kavanaugh Testimony

Capitol Increases Securty Following Kavanaugh Testimony

Police are stepping up patrols in the Capitol amid the intense debate over confirming Brett Kavanaugh.

Packages Destined to Pentagon, White House Tested for Poison

Packages Destined to Pentagon, White House Tested for Poison

Neither package entered the Pentagon, and they were both turned over to the FBI for further analysis, according to authorities.

29 Complete Homeland Security Master

29 Complete Homeland Security Master's Degree Program

These graduates will join a national cadre of cohorts who are helping keep our nation safer.

Keeping the Bad Guys Out

Keeping the Bad Guys Out

Protecting government agencies requires the widest palette of security solutions with facilities ranging from a storefront military recruitment center to a bustling international airport or a biological research center.

Offering More than Products

Offering More than Products

In the security industry, our mission is critical: protect the people, places and things that matter most.

Going High Tech

With the added video capabilities, Manteno authorities can alert agencies north or south of town to be on the lookout for specific vehicles with good description details.

Protecting Hard to Protect Areas

Protecting Hard to Protect Areas

By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks.



The Command Center of the Future

The Command Center of the Future

At the center of any government organization’s security operation stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or Security Operations Center (SOC).

Three Dead, Three Wounded in Maryland Workplace Shooting

Three Dead, Three Wounded in Maryland Workplace Shooting

Deputies were dispatched at 9:09 a.m. and arrived on the scene in five minutes, Gahler said. No shots were fired by law enforcement, and the woman died at a hospital nearby after shooting herself, he said.

Government Website Vulnerability Exposes Over 14 Million Customers

Government Website Vulnerability Exposes Over 14 Million Customer Records

U.S. government payment site GovPayNow.com had poor security measures risking data leaks as far back as 2012

FEMA Testing Presidential Alert System

FEMA Testing "Presidential Alert" System

FEMA is testing an Emergency Alert System that would allow the President access to 99 percent of U.S. cell phones.

Popular Social Media Platform is More Secure than State Department Emails

Popular Social Media Platform is More Secure than State Department Emails

Four U.S. senators are asking for enhanced security for email.

Patrol Wants Increased Security to Remain in North Dakota Capitol

Patrol Wants Increased Security to Remain in North Dakota Capitol

The North Dakota Highway Patrol wants to keep security measures the same following protests of the Dakota Access pipeline.

Remembering 9/11

Airports Increase Security for 9/11 Anniversary

Airports Increase Security for 9/11 Anniversary

Florida officials are boosting security at and around airports for the anniversary of the Sept. 11 attacks.

Boston to get 400 Body Cams After Pilot Program Finds Benefits

Boston to get 400 Body Cams After Pilot Program Finds Benefits

Boston Police Department is looking to phase in 400 body cameras after a yearlong pilot program showed benefits of the tech.

New DHS Cybersecurity Command to Protect U.S. from Cyber Attacks

New DHS Cybersecurity Command to Protect U.S. from Cyber Attacks

Homeland Security has created a new command to help aid the U.S. in cybersecurity efforts.

CBP Turns Away Ukraine and Lithuanian Travelers at PIT Airport for Violating US Immigration Laws

CBP Turns Away Ukraine and Lithuanian Travelers at PIT Airport for Violating US Immigration Laws

CBP urges all international visitors to ensure they possess the appropriate U.S. travel visa for the purpose of their visit

DHS to Strengthened Northern Border Strategy

DHS to Strengthen Northern Border Strategy

The strategy establishes a clear vision and concrete actions that will improve DHS’s efforts to safeguard our northern border against terrorist and criminal threats

Featured

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

  • Report: Only 44 Percent of Organizations are Fully Equipped to Support Secure AI

    Delinea recently published new research on the impact of artificial intelligence in reshaping identity security. According to the report, “AI in Identity Security Demands a New Playbook,” only 44% of organizations say their security architecture is fully equipped to support secure AI, despite widespread confidence in their current capabilities. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.