Top Stories


Teenager Hacks Crypto-Currency Wallet

Teenager Hacks Crypto-Currency Wallet

The teenager ultimately decided to share his findings because he was afraid it would not be explained correctly to customers.

Axis Security Appoints New Business Continuity and Risk Manager

Alan has more than 10 years of commercial security experience.

Austin Bomber Deceased After Police Tracked Him Down

Austin Bomber Deceased After Police Tracked Him Down

The suspect in the Austin bombings detonated a bomb in his car as officers closed in.



Austin Boosts Security as a Result of Package Bombs

Austin Boosts Security as a Result of Package Bombs

UT Austin, Austin Country Club and the neighborhoods in the area are boosting security following the serial bombings.

SIA to Recognize Richard Brent of Louroe Electronics with Chairman's Award

Brent awarded for leading collaborative efforts and leading SIA International Relations Committee.

School Shooting in Southern Maryland Leaves Several Injured

School Shooting in Southern Maryland Leaves Several Injured

Police in southern Maryland are responding to a call at Great Mills High School were several people have been injured in a shooting.

Personal Data of 1.3 Million Shoppers Exposed by Walmart Partner

Personal Data of 1.3 Million Shoppers Exposed by Walmart Partner

According to cybersecurity firm Kromtech, who found it stored in a publicly accessible Amazon S3 bucket.

Package Bombs Have Killed Two in Linked Attacks

UPDATE: Fourth Exploding Package Plagues Austin, Texas

Package bombs left on porches in Texas have killed two people and wounded two more.

The Newest IoT Threat: Child Predators

The Newest IoT Threat: Child Predators

Connected devices at home can record the voices, movements, weight and eating habits of those who live there. They are, in effect, very sophisticated sensors installed in the home environment. As such, they can be utilized by all sorts of people with various motivations and intentions of harming us.

Gunshot Detection System Covers a Third of Pittsburgh

Gunshot Detection System Covers a Third of Pittsburgh

A gunshot-detection system hailed by the Pittsburgh police is poised to cover nearly a third of the city this year.

Google Believes Android is as Secure as iOS Now

Google Believes Android is as Secure as iOS Now

Google released its fourth annual review for Android security. Here are the highlights.

Teacher Accidentally Fires Gun in Classroom, Injuring Three

Teacher Accidentally Fires Gun in Classroom, Injuring Three

A teacher accidentally discharged a firearm while teaching a public safety class at a Northern California school on Tuesday, according to police.

U.S. Power Company Fined $2.7 Million for Security Flaws

U.S. Power Company Fined $2.7 Million for Security Flaws

According to an electronic filing, an unidentified American power company has reached a settlement to pay a $2.7 million penalty over significant security flaws that could have allowed hackers to gain remote access to their systems.

POTUS Nominates Gina Haspel as First Woman CIA Director

POTUS Nominates Gina Haspel as First Woman CIA Director

President Donald Trump announced via Twitter that Gina Haspel would be taking the place of Mike Pompeo.

The New Reality

Technology marches ever forward, lockstep with ‘Moore’s Law.’ However, the influx of technological change affects different industries in different ways.

Open Options to Showcase DNA Fusion and Unified Solutions at ISC West 2018

ISC West attendees are invited to visit Open Options at booth #3103 to learn about the latest features in the DNA Fusion platform, including FlexAPI, Open Options’ application programming interface, OpenDX database exchange software, and DNA Fusion’s Mobile and Web applications.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.