Top Stories


Michigan Governor Releases Details on $20 Million School Safety Plan

Michigan Governor Releases Details on $20 Million School Safety Plan

Gov. Rick Snyder is recommending $20 million to help schools upgrade their security.

Hackers Can Find Your Healthcare Data in Under an Hour

Hackers Can Find Your Healthcare Data in Under an Hour

A new survey found that 38 percent of hackers believe they can access any healthcare data they want to in under an hour.



In Case You Missed It: ISC West 2018

An Amazing ISC West Event

There were a number of great take-a-ways from the 2018 ISC West event last week.

Campus Security Solutions Highlighted at ISC West

Campus Security Solutions Highlighted at ISC West

Several companies at ISC West are dedicated to bringing safety and security to campuses across the country.

Russia Blamed for Coordinated Cyberattacks

Russia Blamed for Coordinated Cyberattacks

The hackers have tried to breach routers, switches and firewalls in an effort to breach organizations across the globe, according to officials.

Seven Inmates Killed Following Incident at Maximum Security Prison

Seven Inmates Killed Following Incident at Maximum Security Prison

Several hours of fighting at a maximum security prison in South Carolina led to the death of seven inmates.

Major Credit Card Companies No Longer Requiring Signatures

Major Credit Card Companies No Longer Requiring Signatures

The adoption of chip-enabled cards has rendered credit card signatures useless.

Consumers’ Trust of Cardless ATMs Will Not Happen Without Strong Mobile Device Security

Consumers’ Trust of Cardless ATMs Will Not Happen Without Strong Mobile Device Security

One key to improving cardless ATM acceptance among consumers is to build trust and comfort by ensuring that best-in-class security measures are in place. Given the right security and layers of defense, the cardless ATM process can be secure.

Views from ISC West Day 2

Another day of ISC West and another 15,000 steps down! The second day of ISC West brought some great conversations, plenty of product demos and a lot of happy hours!

Back on the Road Again

I’m not sure how many of these tradeshows I’ve attended; it’s been quite a few, but nothing compared to Sandra Jones, who told me the other day she has been to at least 100. Well, that’s back when there were three or four of these events per years.

A Remarkable Two Days

I’ve seen and heard some remarkable things the past two days at ISC West 2018. It seems to me that manufacturers are this year offering more new products than the past few years, attendance at this tradeshow has to be a record-setting mark and privacy seems to be a big concern on people’s minds.

Views from Day 1 of ISC West

What a crazy first day of ISC West 2018!! The doors opened up right at 10 a.m. to numerous attendees looking for the most innovative security solutions the industry can offer and boy did they come to the right place!

ASSA ABLOY Offers the Opportunity for Security Professionals to ‘Connect to More’ at ISC West 2018

ASSA ABLOY is committed to helping security professionals connect to more opportunities, people, partnerships, and resources. That commitment will be showcased at ISC West 2018 at ASSA ABLOY booth #8061, highlighting how attendees can “Connect to More.”

OnSSI Drives Continued Growth with New VMS Solutions and Integrations Showcased at ISC West 2018

OnSSI, provider of IP surveillance management solutions, continues its rapid market expansion with enhancements to its industry-leading VMS solutions, additional technology partners, and expansion of the Company’s growing team of experienced professionals.

Boon Edam Continues Growth with Enterprise Group and New Security Entrance Technologies

Boon Edam Inc., a global leader in security entrances and architectural revolving doors, is demonstrating significant growth and momentum in both their product offering and their business operations this year at ISC West (booth #8037).

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.