Top Stories


Deploying a Cloud Strategy

Deploying a Cloud Strategy

There’s enormous opportunity for all enterprises in the cloud, and those in the middle market are taking note.

The Next Wave

The Next Wave

Originally designed as consumer devices, smartphones have become vital elements of both our personal and professional lives. Unfortunately, as sources and repositories of our most sensitive data, smartphones have quickly become a primary attack surface for hackers, cybercriminals and foreign spies.

Crimes on Campus

Crimes on Campus

College and university campuses aren’t immune from the same types of crime, such as burglary and assault, found in any small city where thousands of people live and work closely together. Yet overall, campuses remain a mostly safe place for young adults to learn and mature.



Defending Against Attack

When Paramount Studios, the longest operating and only remaining studio in Hollywood, wanted a preventative solution that would protect tourists and talent from car attacks, they contacted Perimeter Security Group, an integrator that has become one of the leading providers of perimeter security systems in the country.

The Long Reach of Government Security

The government has its fingers in everything, and it is necessary when you think about managing the nation’s infrastructure. Think carefully about securing the nation’s transportation system.

Church Should Be Off Limits

While attending religious services during the holiday season, a local congregant asked me if I had heard about the ISIS threat to local houses of worship in East Texas. I was not aware, but I started digging.

A Slam Dunk

A Slam Dunk

With all this plus four lobbies and multiple entry points, security at American Airlines Center is a 24/7 responsibility. Finding the right camera system for such a diverse environment presented a challenge.

Introducing Kessel Run to DOD

Everyone wants a piece of Kessel Run, the Air Force’s agile software development program, and attempts to replicate its success of are already underway.

Adding Sound and Safety

Adding Sound and Safety

At JFK Airport, immigration officers process hundreds of international passengers per flight. With the continual influx of people combined with limited staffing, law enforcement personnel are increasingly looking for technologies to enhance their efforts to deter illegal entry or trafficking and aid in crime investigation.

More Than a Set of Eyes

More Than a Set of Eyes

The technology behind today’s optical sensors and lenses has come a long way in trying to mimic some of the hallmark characteristics of the human visual system.

Japan to Check 200 Million Devices for Cybersecurity Risks

Japan to Check 200 Million Devices for Cybersecurity Risks

As part of the preparations for next year’s summer Olympics in Tokyo, Japan’s National Institute of Information and Communications Technology will check about 200 million internet-connected devices for potential cybersecurity vulnerabilities.

Philadelphia City Hall Adds Security Measures

Philadelphia City Hall Adds Security Measures

Philadelphia City Hall installed an X-ray machine and metal detector at its entrance during the holidays, according to KYW Newsradio 1060.

Massachusetts Library Hires Retired Police to Patrol

Massachusetts Library Hires Retired Police to Patrol

Trustees’ spokesperson Tracy Davis said that at least one officer will be on duty during all times the library is open to the public. Davis said that the security schedules are coordinated to provide officer coverage for all 59 ½ hours of the library’s weekly schedule.

Courts Biometrics Ruling Poses Risk to Technology Companies

Court's Biometrics Ruling Poses Risk to Technology Companies

The Supreme Court of Illinois ruled Six Flags Great America collected a boy's thumbprint without proper consent.

Apple Disables Group FaceTime Following Reports of a Security Flaw that Allowed Eavesdropping

Apple Disables Group FaceTime Following Reports of a Security Flaw that Allowed Eavesdropping

A glitch in Apple's FaceTime app let users hear—and see—the other person even if the recipient never accepted the call.

Pivot3 Achieves Advanced Certification of Its Intelligent Infrastructure Solutions for Genetec Unified Security Platform

Hyperconverged infrastructure optimized with Genetec Security Center to enhance video capture in enterprise-class IoT and security environments

West Virginia City Considering Installation of New Security Cameras

West Virginia City Considering Installation of New Security Cameras

West Virginia city looks to install security cameras in places where power is limited.

Featured

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

  • Why the Future of Video Security Is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reasons. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.