International


Mission 500 Launches in Canada at Security Canada Central

Raising more funds for children in need.

Gunman Shot Down inside Canada’s Parliament Building

Gunman Shot Down inside Canada’s Parliament Building

It is unclear as to whether there are others in the area.

ASIS International Announces 2015 Board of Directors

Tyson to assume presidency; Chase to join Board Management Committee.

Sidney Airport Triggers Full-Scale Security Alert after Man on iPad wanders through Exit

Sydney Airport Triggers Full-Scale Security Alert after Man on iPad wanders through Exit

A man wandered into a secure area via an exit while focused on his iPad.

Security Industry Grows in Kenya after Westgate Attack

Security Industry Grows in Kenya after Westgate Attack

The attack on the Westgate shopping mall has led to boosted business in the private security industry.

Enough to Go Around

Some of the most satisfying applications of sophisticated security technologies have little to do with security. Today, biometric identity management plays a critical role in delivering necessary vaccines to children in the developing world.

Government Websites in Israel Hacked by Anonymous

Government Websites in Israel Hacked by Anonymous

In wake of recent bombings, activist group feels need to hack.

The Ultimate Cybersecurity Fix

The Ultimate Cybersecurity Fix

Typewriter sales in German economy boom as tool to thwart cyber spying.



Another Malaysian Airlines Plane is Down

Another Malaysian Airlines Plane is Down

BUK is the suspected culprit behind this plane crash over the Ukraine-Russia border.

Commonwealth Games Security to Cost 90 Million Pounds

Commonwealth Games Security to Cost 90 Million Pounds

Scottish police preparing to install a "ring of steel" around the venues to prevent possible terrorist attack.

World Cup 2014 Phishing Scam

World Cup 2014 Phishing Scam

Petition floating around Facebook supporting Lewis Alberto Suarez Diaz (the biter) scamming people out of their personal data.

Security Metrics Research Report Just Released

New metrics evaluation tool, metrics database and usage guidelines included to provide security practitioners with powerful resources to measure and demonstrate value of security functions.

China to Punish Google, Apple and Microsoft for Spying

China to Punish Google, Apple and Microsoft for Spying

China's People's Daily, a state-operated media outlet, promises punishments as translated by Reuters.

Security Stunt Pulled by Australian Politician in Parliament

Security Stunt Pulled by Australian Politician in Parliament

Wheat farmer pulls pipe bomb from bag, illustrating that government building security measures are failing. (Video Included)

Thieves Dig 50 Foot Tunnel to Steal ATM

Thieves Dig 50 Foot Tunnel to Steal ATM

Thieves fling dirt and soil to get to their pot of gold in Manchester, UK.

Using Stolen Passports Uncalled For

Using Stolen Passports Uncalled For

Two passengers who boarded disappearing Malaysia Airlines jet with stolen passports could have been identified by authorities within seconds possibly minutes.

Delta

Delta's New Electrically-Controlled Barrier Receives P1 Rating at ASTM M50 Test Level

With only a 24-inch foundation new Delta HD300 stops 15,000 pound truck at 50 MPH.

Profile of a Modern Terrorist

Profile of a Modern Terrorist

Learn what terrorists believe, their goals, timeline and tactics, and last but certainly not least, how to protect ourselves against terrorism.

Dilemma Over Drone Strikes Against American Citizens

Dilemma Over Drone Strikes Against American Citizens

Should the Obama administration kill an American citizen who is a member of al-Qaeda and is actively planning attacks against Americans overseas or legally build a case against him?

Protecting the Winter Olympics in Sochi

Protecting the Winter Olympics in Sochi

A layered approach to security keeps athletes, coaches, dignitaries and fans safe during the Winter Games.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.