International


Mission 500 Launches in Canada at Security Canada Central

Raising more funds for children in need.

Gunman Shot Down inside Canada’s Parliament Building

Gunman Shot Down inside Canada’s Parliament Building

It is unclear as to whether there are others in the area.

ASIS International Announces 2015 Board of Directors

Tyson to assume presidency; Chase to join Board Management Committee.

Sidney Airport Triggers Full-Scale Security Alert after Man on iPad wanders through Exit

Sydney Airport Triggers Full-Scale Security Alert after Man on iPad wanders through Exit

A man wandered into a secure area via an exit while focused on his iPad.

Security Industry Grows in Kenya after Westgate Attack

Security Industry Grows in Kenya after Westgate Attack

The attack on the Westgate shopping mall has led to boosted business in the private security industry.

Enough to Go Around

Some of the most satisfying applications of sophisticated security technologies have little to do with security. Today, biometric identity management plays a critical role in delivering necessary vaccines to children in the developing world.

Government Websites in Israel Hacked by Anonymous

Government Websites in Israel Hacked by Anonymous

In wake of recent bombings, activist group feels need to hack.

The Ultimate Cybersecurity Fix

The Ultimate Cybersecurity Fix

Typewriter sales in German economy boom as tool to thwart cyber spying.



Another Malaysian Airlines Plane is Down

Another Malaysian Airlines Plane is Down

BUK is the suspected culprit behind this plane crash over the Ukraine-Russia border.

Commonwealth Games Security to Cost 90 Million Pounds

Commonwealth Games Security to Cost 90 Million Pounds

Scottish police preparing to install a "ring of steel" around the venues to prevent possible terrorist attack.

World Cup 2014 Phishing Scam

World Cup 2014 Phishing Scam

Petition floating around Facebook supporting Lewis Alberto Suarez Diaz (the biter) scamming people out of their personal data.

Security Metrics Research Report Just Released

New metrics evaluation tool, metrics database and usage guidelines included to provide security practitioners with powerful resources to measure and demonstrate value of security functions.

China to Punish Google, Apple and Microsoft for Spying

China to Punish Google, Apple and Microsoft for Spying

China's People's Daily, a state-operated media outlet, promises punishments as translated by Reuters.

Security Stunt Pulled by Australian Politician in Parliament

Security Stunt Pulled by Australian Politician in Parliament

Wheat farmer pulls pipe bomb from bag, illustrating that government building security measures are failing. (Video Included)

Thieves Dig 50 Foot Tunnel to Steal ATM

Thieves Dig 50 Foot Tunnel to Steal ATM

Thieves fling dirt and soil to get to their pot of gold in Manchester, UK.

Using Stolen Passports Uncalled For

Using Stolen Passports Uncalled For

Two passengers who boarded disappearing Malaysia Airlines jet with stolen passports could have been identified by authorities within seconds possibly minutes.

Delta

Delta's New Electrically-Controlled Barrier Receives P1 Rating at ASTM M50 Test Level

With only a 24-inch foundation new Delta HD300 stops 15,000 pound truck at 50 MPH.

Profile of a Modern Terrorist

Profile of a Modern Terrorist

Learn what terrorists believe, their goals, timeline and tactics, and last but certainly not least, how to protect ourselves against terrorism.

Dilemma Over Drone Strikes Against American Citizens

Dilemma Over Drone Strikes Against American Citizens

Should the Obama administration kill an American citizen who is a member of al-Qaeda and is actively planning attacks against Americans overseas or legally build a case against him?

Protecting the Winter Olympics in Sochi

Protecting the Winter Olympics in Sochi

A layered approach to security keeps athletes, coaches, dignitaries and fans safe during the Winter Games.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.