Top Stories


Protecting Hard to Protect Areas

Protecting Hard to Protect Areas

By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks.

The Command Center of the Future

The Command Center of the Future

At the center of any government organization’s security operation stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or Security Operations Center (SOC).

Stick ‘Em Up, Partner

The TSA is implementing some pretty amazing technology in order to improve explosives detection. In late August, the agency unveiled a state-of-theart advanced technology computed tomography (CT) checkpoint scanner for screening passengers and their baggage.



Simplicity and Flexibility

Simplicity and Flexibility

Wireless technology in the security space is on the cusp of becoming the new norm. For the past few years we’ve seen the adoption of the technology grow steadily as it continuously improves upon traditional security solutions.

Focus on Protection

Good business is about partnerships. Our cover story in this issue comes from Jeff Huggins who has written about different examples of not only keeping people secure, but also offering protection.

Chegg Data Breach Affects 40 Million Customers

Chegg Data Breach Affects 40 Million Customers

The hack dates back to April 2018, and compromised information includes email addresses and passwords.

Mozilla Launches Data Breach Notification Service

Mozilla Launches Data Breach Notification Service

“Firefox Monitor” will allow users to check whether their personal information and passwords have been part of a data breach

Delta Air Lines to Launch Nation’s First Facial Recognition Airport Terminal

Delta Air Lines to Launch Nation’s First Facial Recognition Airport Terminal

The terminal will be deployed at Hartsfield-Jackson Atlanta International Airport, and will allow travelers to use facial recognition instead of their passports to pass through checkpoints at the airport.

Live from GSX Day 3

Another busy day of GSX 2018 is in the books and with it came excited conversations, innovate products and streamlined solutions. With each booth I visited, I was excited by the new solutions and the potential deployments in the security space.

Tradeshow Brings Mixed Reviews

So, it all comes down to this. Today is the final day of the new GSX 2018, and the final tally should show a mixed review.

Apple’s New OS Has Severe Security Flaw

Apple’s New OS Has Severe Security Flaw

MacOS Mojave shipped with a bug that allows unauthorized access to a user’s private data.

Smarter, Not Harder

Each year at trade shows I like to identify common theme. Usually, I base this off of the conversations that I have in different booths throughout the the show. For GSX 2018, I talked with several companies who are in the business of working smarter, not harder. The kinds of buzz words I heard were: intelligent, artificial intelligence, smart, deep learning and machine learning.

Free VPNs are a Privacy Nightmare: Here

Free VPNs are a Privacy Nightmare: Here's Why

Understanding the details and the primary difference between free VPNs and paid ones.

Live from GSX: Day 3

Another busy day of GSX 2018 is in the books and with it came excited conversations, innovate products and streamlined solutions. With each booth I visited, I was excited by the new solutions and the potential deployments in the security space.

Axis Showcases Discreet Corner Surveillance, Bullet Cameras and More

In its continued vision to innovate for a smarter, safer world, Axis Communications announced a new innovation for discreet corner surveillance and its latest innovations in bullet cameras and multidirectional cameras will be showcased at the Global Security Exchange (GSX) tradeshow in Las Vegas, NV, September 25-27.

Campus Security Solutions at GSX

It is not a secret that campus security is the buzz word around events like GSX given the on-campus violence we have seen in the last year. Companies are putting their heads together and trying to figure out a better way to keep students, faculty and staff safer at K-12, universities, medical facilities, corporate campuses and more.

Celebrating Humanity

There are plenty of great things to talk about when it comes to a security tradeshow; however, there may not be anything more important that people coming together for a common cause.

Motorola Solutions Adds New Features to Ally Cloud-Based Security Software

Motorola Solutions recently announced new features for Ally, its cloud-based security software platform for enterprises in North America. Available now, the enhancements enable communication and real-time information-sharing for security teams.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.