Government


Obama’s Security Strategy Features Robust Leadership, Limitations

Obama’s Security Strategy Features Robust Leadership, Limitations

The President’s second, and final, national security strategy focuses on limiting how much the United States can shape world events.

How Safe is Taxpayer Data?

How Safe is Taxpayer Data?

Several technologies are available that help detect misuse of taxpayer information.

Black Hawk Helicopters and Massive X-ray Machines to Attend Big Game this Sunday

Black Hawk Helicopters and Massive X-ray Machines to Attend Big Game this Sunday

Government agencies team up to ensure players, coaches, staff and attendees are safe and secure.

Obama Responds to White House Drone Security Breach

Obama Responds to White House Drone Security Breach

What the U.S. President said while in India plus a little drone trivia.

Drone Found on White House Grounds

Drone Found on White House Grounds

Officials say there is not an ongoing threat after the drone was discovered overnight.

NYPD Increases Security over Charlie Hebdo

NYPD Increases Security over Charlie Hebdo

Stores in NYC that sold the Charlie Hebdo issue following the Paris attack are getting increased police protection.

Security Increased at US Military Bases in Europe

Security Increased at US Military Bases in Europe

Ongoing concerns about the return of Europeans to their home countries in Iraq and Syria led to raised security levels.

Obama Promotes Cybersecurity in State of the Union Address

Obama Promotes Cybersecurity in State of the Union Address

His emphasis was on protecting families, especially children.



Genetec to Support New Microsoft Cloud for Government Service

Addressing compliance and security requirements for U.S. public sector, U.S. state, local and federal government agencies can now host Genetec Cloud Services on New Microsoft Azure for government.

HID Global Shares Top Secure Identity Trends for 2015

Key trends for banks, hospitals, universities and federal agencies, as well as government ID, transportation, enterprise and retail applications.

Russia to Build New Weapons for Security

Russia to Build New Weapons for Security

Putin tours shooting range and sees futuristic weapons, now Russia to modernize their weapons.

U.K. Creates Closer Cyber Security Ties in Washington

U.K. Creates Closer Cyber Security Ties in Washington

The Prime Minister is lobbying President Obama this week.

Military Tightens Security at Base in Delaware after Drivers Raise Suspicion

Military Tightens Security at Base in Delaware after Drivers Raise Suspicion

Unknown suspects tried to probe the base for security weaknesses.

Military Tightens Password Security after Central Command Hack

Military Tightens Password Security after Central Command Hack

Officials have launched an investigation into the attack

Security Services on High Alert for Beheading Attack in Britain

Security Services on High Alert for Beheading Attack in Britain

Online discussions regarding the killing of soldiers and police lead to security services entering a state of high alert.

Monday Monologue of Security-related Issues

Monday Monologue of Security-related Issues

From one of the black boxes being retrieved from the AsiaAir flight crash to talks of speeding up nuclear talks, this is top news you need to know.

France to Mobilize 10,000 troops

France to Mobilize 10,000 troops

France is taking a number of measures in a reaction to last week’s terrorist attacks.

Drastic Security Measures being taken for Boston Marathon Bombing Trial

Drastic Security Measures being taken for Boston Marathon Bombing Trial

Armed boats and police dogs are just a couple of the ways officials are protecting the trial.

Policewoman Shot in Paris Following Attacks

Policewoman Shot in Paris Following Attacks

The gunman also reportedly robbed a gas station in the northern part of the country

12 Dead in Attack on Paris Newspaper

12 Dead in Attack on Paris Newspaper

Charlie Hebdo, a satirical newspaper, was the target of what many are calling a terrorist attack

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities