Homeland Security


Border Patrol Scores in Marijuana Bust

Border Patrol Scores in Marijuana Bust

Border Patrol agents assigned to the Rio Grande Valley Sector seized more than 1,400 pounds of marijuana Monday.

Muslim Boy Builds Clock, Gets Mistaken for Building Bomb

Muslim Boy Builds Clock, Gets Mistaken for Building Bomb

Ahmed Mohamed was detained after his teacher notified authorities.

Security Threat against Pope Francis Allegedly Thwarted

Security Threat against Pope Francis Allegedly Thwarted

Federal Authorities are concerned about security threats against the pope.

Can You Take Frozen Liquids through Airport Security?

Can You Take Frozen Liquids through Airport Security?

One man tried to find out.

Real-Time Technology Group Earns DHS Safety Act Designation

Rewards invention and commercialization of anti-terrorism technologies.

Yay or Nay for a U.S. Border Wall

Yay or Nay for a U.S. Border Wall

A brief history of unsuccessful attempts in light of current presidential debates between candidates.

Knowing Your Access Control

Knowing Your Access Control

With four or more access points around your property, there is no way that you can keep eyes at all entry points, especially if all can’t be viewed from a single location.

DHS Issues Warning about Hobbyist Drones

DHS Issues Warning about Hobbyist Drones

Recreational drones could be used by adversaries to attack the United States.



Navigating the High Seas

Navigating the High Seas

In recent years, the cruise industry has received a lot of attention from the news media regarding serious security issues onboard its vessels, ranging from people falling overboard to sexual assaults.

Man Bypasses Security at DFW Airport without ticket or ID

Man Bypasses Security at DFW Airport without ticket or ID

Damarias Cockerham passed through the TSA checkpoint and boarded a flight to Guatemala.

Wrightstyle and an Aluminum Anniversary

Wrightstyle and an Aluminum Anniversary

Tim Kempster, Wrightstyle’s MD, takes a look at bomb blast safety.

Military Has Security Tightened After Chattanooga Shooting

Military Has Security Tightened After Chattanooga Shooting

The order covers thousands of military facilities within the U.S.

The threat of terror, real or imagined, has focused the minds of building owners, architects, engineers, technologists and planners to better design buildings that can withstand a whole new array of risks.

Online Exclusive: A Perspective on Glass and the Terrorist Threat

The threat of terror, real or imagined, has focused the minds of building owners, architects, engineers, technologists and planners to better design buildings that can withstand a whole new array of risks.

FBI Prevented Islamic State Attacks on July 4th

FBI Prevented Islamic State Attacks on July 4th

10 people arrested over the past 4 weeks.

China Adopts New National Security Law

China Adopts New National Security Law

Critics have said the law might be used to eliminate dissent.

Federal Authorities Issue Fourth of July Terror Warning

Federal Authorities Issue Fourth of July Terror Warning

Tips to help you, your family and friends stay safe and alert while enjoying firework displays.

Arab Countries Looking to Increase Security after Suicide Bomber Kills 26

Arab Countries Looking to Increase Security after Suicide Bomber Kills 26

Gulf Arab countries face rising tensions due to conflicts between Sunnis and Shiites.

China Security Law to Cover Space and Sea

China Security Law to Cover Space and Sea

China is adding assets in space, deep sea and polar regions to its pending national security law.

Potential Threat Leads to Navy Increasing Security in Philadelphia

Potential Threat Leads to Navy Increasing Security in Philadelphia

The threat targets the Navy Yard

Whistleblower Calls Out Visa Program for Wealthy Foreigners

Whistleblower Calls Out Visa Program for Wealthy Foreigners

Taylor Johnson came forward with critical comments regarding a program known as EB-5.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.