Top Stories


Google Gives Users Better Access to Privacy & Security Settings

Google Gives Users Better Access to Privacy & Security Settings

Google has announced it has overhauled it's privacy and security settings service

Baseline Hardening The Best Defense Against Advanced Persistent Threats

Baseline Hardening: The Best Defense Against Advanced Persistent Threats

What business should do to protect against APTs



5 Ways Digital Connectivity is Revolutionizing Education

5 Ways Digital Connectivity is Revolutionizing Education

Insight into how digital learning technology will shape schools in the future

Robotic Assistance Devices Releases New Security Solution: SCOT™ Wally

The wall-mounted version of the Security Control and Observation Tower (SCOT™) provides increased visibility to organizations at a fraction of the cost

Threat Intelligence From The Dark Web

Threat Intelligence From The Dark Web

The reputation of the “Dark Web” perhaps exceeds its reality

The 10 Best VPNs for Cryptocurrency Payment in 2018

The 10 Best VPNs for Cryptocurrency Payment in 2018

Make secure transactions with the best VPN service

Why a Cloud First Strategy Leaves the Door Open to Hackers

Why a Cloud First Strategy Leaves the Door Open to Hackers

Kicking off a cloud-first strategy without considering security measures can cloud your judgement

How AI Can Deliver a Safer Future

How AI Can Deliver a Safer Future

The ability of the latest developments in deep learning and neural networks to detect suspicious behaviour looks set to revolutionize security and law

CBP Turns Away Ukraine and Lithuanian Travelers at PIT Airport for Violating US Immigration Laws

CBP Turns Away Ukraine and Lithuanian Travelers at PIT Airport for Violating US Immigration Laws

CBP urges all international visitors to ensure they possess the appropriate U.S. travel visa for the purpose of their visit

DHS to Strengthened Northern Border Strategy

DHS to Strengthen Northern Border Strategy

The strategy establishes a clear vision and concrete actions that will improve DHS’s efforts to safeguard our northern border against terrorist and criminal threats

Homeland Security Launches Training For Countering Terrorists Exploitation of Social Media

Homeland Security Launches Training For Countering Terrorists Exploitation of Social Media

This online 90-minute training is designed to educate startup companies and social media companies about how terrorists may seek to exploit their platforms.

Police Are Training Canines to Sniff Out Electronics

Police Are Training Canines to Sniff Out Electronics

Strong nosed K-9s help police sniff out electronics.

Featured

  • Next-Gen AI for Smart Cities

    The future of smart city technology is not being shaped in Silicon Valley — it is taking root in Dubuque, Iowa. With a population of about 60,000, this mid-sized city has become a live testbed for AI-driven traffic management thanks to a unique public-private collaboration led by Milestone Systems. Project Hafnia demonstrates how cities can transform urban mobility and safety through Responsible Technology—without costly infrastructure overhauls. Read Now

  • The Progress of Biometrics

  • Bringing it Together

    Public safety communications have long been used to help first responders save lives and to help keep first responders safe, improve response time, and enhance interagency coordination. These communication solutions may include mobile (5G), radio telecommunication and mass notification systems. Read Now

  • Exploring the Future of Video

    AI innovation is rapidly transforming video security. Edge-based AI centered on object detection excels at detecting people and vehicles to alert to threats like brandished guns or perimeter breaches. However, the onus is on the user to gather more details to fully understand the situation. Read Now

  • Allegion, Comfort Technologies Implement Mobile Credentials at the Artisan Apartment Homes in Florida

    Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a leading provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.