Top Stories


camera with facial recognition software

Security Industry, Police Groups Urge Congress Not to Ban Facial Recognition Technology

A coalition sent a letter to Congress asking members to consider alternatives to banning facial recognition, including the development of best practices and additional training.

Delta Scientific MP5000 Portable Barrier Certified to ASTM M50/P3

​Delta Scientific announced that traffic access control professionals can now set up MP5000 portable barriers on concrete, asphalt, compacted soils or vegetation in 15 minutes or less to provide certified M50 stopping power.

Theft on Wheels

Theft on Wheels

Oddly enough, in a world where virtually any item is only a mouse click and 24-hour delivery window away, we tend not to think much about how our merchandise gets from some warehouse to our front door. Unfortunately, there are thieves who do.



Smart City Technologies

Smart City Technologies

Two of the biggest trends today, particularly in the security surveillance and IoT realms, are border security and the emergence of local governments transforming their communities into smart cities.

Ushering in a New Era

Ushering in a New Era

Privacy issues continue to dominate headlines as the world’s biggest companies are being challenged on the ways they collect and use people’s data. Consumers are growing more concerned about how their activities are being tracked across the web as companies sell information to advertisers for a profit.

The Technology Role

While the political discussions that focus on how to secure America’s borders rage on without a clear resolution regarding what or how policies and procedures could change, one element of the discussion remains clear and present–that technology must and will play an ever more significant role at the U.S. border.

Technology at Risk

The San Francisco Board of Supervisors’ vote to ban the use of facial recognition technology puts the city at risk of not only falling behind on technological innovation, but returning to what one expert described as archaic processes.

Quality Control is Everything

Quality Control is Everything

In today’s world, there are a myriad of different manufacturers that produce similar products and there are so many options available to customers.

Are Contractors Ready for DOD’s Cybersecurity Framework?

Are Contractors Ready for DOD’s Cybersecurity Framework?

Contractors will face big changes and tight timelines next year when the Defense Department institutes its new Cyber Maturity Model Certification framework

Expanding Cybersecurity Solutions

Expanding Cybersecurity Solutions

Under GDPR, companies can be fined for not having their records in order, not notifying the supervising authority and those affected by a breach, or not conducting an impact assessment.

best buy store

Family of Murder Victim Sues Best Buy, Delivery Companies For Poor Background Check Practices

Evelyn Udell was allegedly killed by a deliveryman employed by a Best Buy contractor. Her family says her death could have been prevented by better background checks.

AI Beyond the Hype

AI Beyond the Hype

Today, there are in-depth discussions about what ‘might be’ possible with AI, machine and deep learning-based analytics products on the market.

Selecting the Proper Technology

Back in the day, talking about government security was all the rage. In fact, it was about cameras, software and access control.

ABLOY USA Hires Shayne Spears as Oil & Gas Vertical Market Manager

ABLOY USA is adding more support staff and has hired Shayne Spears as the new Vertical Market Manager for Oil & Gas.

Delivery App DoorDash Becomes Latest Company To Suffer Data Breach Affecting Millions

Delivery App DoorDash Becomes Latest Company To Suffer Data Breach Affecting Millions

4.9 million users have been affected by the data breach, which DoorDash discovered in the past month.

Tech Sales Expert Mike Taylor Joins Razberi Technologies as VP of Sales

Mike Taylor joins Razberi Technologies as VP of Sales to accelerate its growth in the video surveillance security arena.

Following Shooting, Florida VA Hospital Increases Police Presence and Security Checks

Following Shooting, Florida VA Hospital Increases Police Presence and Security Checks

The hospital where a mentally ill veteran opened fire in an emergency room is also home to a congressional office.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.