Homeland Security


ID'ed Indeed

NATIONAL identification cards were being promoted long before the terrorist attacks of Sept. 11, 2001, as a means to identify potential terrorists, curb illegal immigration and thwart criminal activity. Countries around the world are already using national ID cards. Singapore recently implemented Singapore Personal Access, or “SingPass,” an ID used for e-government services. Germany uses an encrypted biometric national ID. Malaysia established “Mykad,” a universal-purpose ID card, and no less than a dozen other countries have issued contracts to develop the infrastructure to support a national ID card.



Securing the Friendly Skies

ANYWHERE in the world, most security and intelligence officers will agree that transportation security is about managing risk. It's about detecting potential threats as early as possible, reacting appropriately and mitigating the ripple effects, all the while focusing on simplifying travel for billions of passengers who do not warrant concern.

Protecting Mobility

FROM Barcelona to Berlin and all across Europe, workers today need to access corporate information outside the workplace. Remote access frees workers from the restrictions of the corporate work environment. By working from any location and at any time, employees can collaborate more effectively, work more efficiently and ultimately be much more productive.

Going With the Flow

Closing the Loop

THE security industry has a long and proud history of working side by side with the government to develop new technologies that result in an improved way of life for Americans. While commercial security products and practices have deep affiliation with both government applications, military and non-military, a new breed of security concerns gave birth to new security requirements and solutions–especially those pertaining to border control.

All Eyes on the Road

A heightened sense of awareness of threats that face the United States has placed ongoing pressure at a national, state and local level to keep citizens safe from terrorism, as well as natural disasters and other unplanned events.

Homeland Security Insider

A few hours after taking control of Congress and following 12 years of Republican dominance, House Democrats announced a plan they say will strengthen homeland security. Accusing Republicans of neglect, Democrats on the Homeland Security Committee say their plan will implement the unfinished 9/11 Commission recommendations; require private companies to prepare for terrorism; require the government to inspect cargo on passenger planes; and require all cargo containers carried on ships to be scanned and sealed before leaving for an American port.

Visit with the Shrink

TO a significant extent, shrink can be predicted and tamed with targeted security resources, institutional awareness and effective, operationally feasible countermeasures. In statistical analysis, the goal is to explain variation and to determine what part of that variation is systematic and predictable.

Teaming Up

NAVIGATING the world of federal government contracts can be a head-spinning operation for even the most committed and headstrong business. But for many, working with the federal government, especially with the constantly growing Department of Homeland Security, is too big a proposition to pass up. With 183,000 employees and a budget of more than $42.7 billion in fiscal year 2007, DHS is the third-largest cabinet department in the federal government and a target for many companies to garner new business.

Homeland Security Insider

FOUR years in the making, the drive to implement HSPD-12 at long last began by issuing smart identification cards last October. Every federal agency has now opened at least one facility where employees can go to get personal identification verification (PIV) cards fitted to the strict criteria of FIPS 201. This year, federal agencies will begin to activate a massive interoperable system of card readers in which any agency's readers will be able to read and process cards presented by any and all federal employees -- no matter what agency employs them.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

On Alert

SECURING the flow of oil from offshore platforms, land-based drilling rigs and pumping stations across miles of pipeline and infrastructure is a top priority for the government and the petroleum industry.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.