Top Stories


House Minority Leader Seeks FBI, CIA Briefing after Two Men on Terror Watchlist Stopped at Border

House Minority Leader Seeks FBI, CIA Briefing after Two Men on Terror Watchlist Stopped at Border

Rep. Kevin McCarthy (R-CA) would like to have an FBI and CIA classified briefing, as well as other lawmakers, following reports that two people on the on the FBI's terror watchlist were apprehended after crossing the southern border.

Hanwha Techwin America Appoints C.H. Ha as New President

Hanwha Techwin has appointed C.H. (Choong Hoon) Ha as the new president of Hanwha Techwin America.

Border Patrol Rescues 2 Abandoned Children

U.S. Border Patrol agents rescued two children who had been abandoned along the border near Jacumba Monday afternoon.



Panasonic i-PRO Partners with Genetec on New Cloud-Based Digital Evidence Management System

Panasonic i-PRO Sensing Solutions Corporation of America is partnering with Genetec Inc. to offer a cloud-based digital evidence management system for law enforcement customers.

Carson and dormakaba Announce Integration to Expand SMART Multifamily Security Solutions

Carson, creator of the One-App Resident ExperienceTM and 24/7 remote doorman service for multifamily properties, and dormakaba have announced an integration and distribution partnership.

XTEND Delivers Counter-Drone Systems to Department of Defense Office

XTEND is providing counter-unmanned aircraft system (C-UAS) technologies for U.S. military and defense entities.

Gallagher Named Vice President at Group 337

Group337 have announced the appointment of Hilary Gallagher as vice president, responsible for internal and external marketing, communication, branding and content creation.

Lessons Learned from Oldsmar Water Plant Hack

Lessons Learned from Oldsmar Water Plant Hack

Cybersecurity experts have long warned of attacks on small municipal systems. Until hackers accessed the water treatment plant of a small Florida city this year, those warnings were “out of sight, out of mind.” Now, both local and national authorities’ perspectives on the dangers of cybersecurity attacks are changing.

Car Rams Barricade at U.S. Capitol, Kills Officer

A car rammed into two Capitol Police officers at a barricade outside the U.S. Capitol building in Washington, D.C., on Friday afternoon. According to AP News, one of the officers was killed, another was injured, and the driver of the vehicle was shot and killed.

Protecting Critical Infrastructure

Virtually every U.S. citizen counts on the nation’s critical infrastructure for services and products that touch their lives daily.

Steering the Conversation

Steering the Conversation

When navigating the Smart City market, it is wise to speak to the priorities and concerns of diverse stakeholders, many of whom might lie outside the security integrator’s traditional business.

A Capitol Breach

A Capitol Breach

On Jan. 6, the U.S. Capitol security perimeter was breached and the nation watched as multiple levels of security failed.

Actionable Intelligence

There is no doubt that Artificial Intelligence (AI) is here to stay, as new AI-driven solutions are pervasive across every category of professional and consumer electronics today.

Going Beyond Retail

Going Beyond Retail

Physical security infrastructure has traditionally been seen as a sunk cost; an expense that represents a cost of doing business.

A Sound Strategy

A Sound Strategy

No matter the security criticality of your facility or the sophistication of your security system, simple key control is a foundational process of physical key management that helps control access to crucial assets, people, information and spaces.

Running the Gauntlet

Running the Gauntlet

Not long ago when visiting a colleague’s office, it was protocol to arrive early to run the gauntlet of the visitor management check-in that awaited, a process that might gladly be endured now if just for a brief return to some normalcy.

The Bottom Line

The Bottom Line

Last year brought tremendous challenges for everyone, especially retailers. Retail shrinkage, the reduction of inventory from shoplifting, fraud and internal theft, is estimated to have cost the industry $61.7 billion according to a 2020 National Retail Security Survey, an all-time high.

A Healthier Facility

Amid the health, economic, natural, and social crises we’ve experienced in the past year, the critical role that security plays in creating safe and healthy environments is more apparent than ever.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.