Top Stories


Trucking fleets may be the next targets of ransomware

The Next Victims

Among the common types of cybersecurity attacks perpetrated on enterprises, arguably none are as sophisticated, effective or lucrative as ransomware is today.

Secure Your Containers

Development and deployment of container-based software has become a popular movement in technology.

Common Mistakes

As the cyber threat landscape has matured and evolved, cybersecurity incidents have become a regular occurrence.



Ohio County Taps Startups for Automation

Officials in Cuyahoga County, Ohio are looking to digitize and automate paper-based processes at several agencies through a program that encourages governments, startups and small businesses to collaborate on solutions.

Policy Bill Includes Cyber Investments

Data on OTAs and prototypes. The House proposed an annual reporting requirement on how the Defense Department is using OTAs.

All About the Data

All About the Data

When you consider today’s smartphones, the phone part is almost ancillary. It’s really the apps and the advanced optics that drive the purchase.

It Takes a Village

It Takes a Village

As the city began strategically deploying surveillance cameras throughout Atlanta, APF invested $350,000 to create the cuttingedge Loudermilk Operation Shield Video Integration Center (VIC).

This is Big Business

This is Big Business

When it comes to government contracting, security spending is big business—and small business too.

Transforming the Industry

Transforming the Industry

Artificial Intelligence (AI) continues to gain momentum every day, and it is already poised to augment and enrich many aspects of our business and personal lives.

Airport IoT Operations

The Internet of Things (IoT) has landed in airport operations. More than 20 billion end devices are already networked via the Internet, and there will likely be three times more than this by 2025, according to Statista.

Transforming Healthcare Security

Transforming Healthcare Security

Security is a top priority at healthcare facilities across the country, but developing and deploying an effective healthcare security strategy is a challenging process.

Reconsidering Used Equipment

Reconsidering Used Equipment

Once you have made the decision to install a security entrance, you may find that your search for a provider brings you to used turnstiles, revolving doors or portals for sale. Naturally, these tend to be cheaper than new products.

cyber command center

Documents Reveal Why U.S. Military Publishes Malware Used by North Korean and Russian Hackers

CYBERCOM has created a Twitter account with thousands of followers to publicize malware samples it shares with cybersecurity companies. Internal documents explain that it’s part of a defensive (and offensive) strategy.

miller brewery

Employee Who Frequently Argued With Colleagues Kills Five At Milwaukee’s Miller Brewery

The gunman, who took his own life after shooting and killing five others, had frequent conflicts with his coworkers.

capitol hill building

Lawmakers Plan Bill That Would Endanger Tech Company Efforts to Implement Full Encryption

The legislation reflects growing frustration from the Justice Department about the encryption practices of tech companies, particularly when it comes to investigating child abuse or terrorist activity.

Deep Learning Advances and Cybersecurity Highlighted By IDIS at ISC West

Korea’s largest video tech manufacturer will be demonstrating the latest AI-driven metadata filtering capabilities.

The Open Platform

The Chickasaw Nation standardizes video technologies to secure one of the world's largest casinos

california state capitol

California’s Consumer Privacy Act Affects How Companies Will Store Data Nationwide

CCPA (officially called AB-375) incorporates some of the elements of GDPR and takes a broader view of private data and protecting PII. The storage, transportation, and management of sensitive consumer and company information have become critical issues for companies of all sizes to lock down and secure.

Featured

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.