Top Stories


The Cost of Cybercrime

The Cost of Cybercrime

Cybercrime is a large and dangerous business and it impacts individuals, businesses and governments worldwide.

Locking the Cabinet

Locking the Cabinet

Providing independent consulting, best-inclass products, hosting solutions and financial services to more than 1,000 U.S.- and Canada-based companies, Forsythe is one of the largest independent IT integrators in North America.

Luxury in Your Apartment

Luxury in Your Apartment

Commerce Tower on Main, in Kansas City, Mo., is redefining downtown apartment living by creating an energy-efficient, vertical neighborhood with luxury apartments, exclusive amenities and a connected lifestyle.



Transforming Security

Transforming Security

Empresa Eléctrica de Guatemala (EEGSA Group) required a video surveillance system that could digitize the security footage on its substations to help avoid damage to its own infrastructure as well as electrocution hazards for people trying to access these places without warning or authorization.

Four Video Storage Trends to Watch

Four Video Storage Trends to Watch

Data storage is becoming a hot topic in the video surveillance industry and gaining more attention as retention periods continue to increase.

How to Plan for Product Updates

Making changes to an existing product is more than adding a tweak here and a new feature there.

The Right Fit

The Right Fit

Standalone systems, where certain access points are equipped with card readers but are not connected to a larger network, can provide a cost-effective access control solution.

Serious About All Security

I read a recent news story I wanted to share and make aware of the ramifications. After nearly disappearing in the 1990s, the spread of child sexual abuse material exploded with the rise of the internet, while child sex trafficking increased with exposure to a greater market online. Today, the problem is complex and still growing.

Banking on Efficiency

Banking on Efficiency

Operating in more than 4,000 buildings, one of the largest U.S. banks could not keep up with the onboarding and off-boarding of 300,000-plus employees, contractors, vendors and visitors.

Know Your Enemy

Like it or not, every time you spend time on the keyboard, there may be someone watching your every keystroke. It wouldn’t hurt if you knew your enemy; and it certainly would be beneficial if you knew who was on your side.

A Balancing Act

A Balancing Act

Energy security, access to the electrical grid and police and fire safety are just a handful of the networked services that we take for granted and rely upon on a daily basis.

Why Do Commonly Used Security Measures Fail

Why Do Commonly Used Security Measures Fail

Information security is defined as a reactive activity, as it involves managing risks that may have a serious effect on the organization if they occur.

Shifting Focus

Organizations are changing how they look at security as users employ mobile devices for everything from opening doors to accessing information and services.

Jaden Hesman Receives Midwest Alarm Services President's Award

The President’s Award recognizes those employees who made a noticeable, significant impact to its organization in 2017.

ICE To Gain Access to License Plate Tracking Database

ICE To Gain Access to License Plate Tracking Database

The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database.

Trump

Trump's National Security Team Wants to Stop Chinese Spying with 5G Network

The President's national security team is looking at options to counter the threat of China spying on U.S. phone calls.

Bitcoin Security Scrutinized After $534 Million Stolen

Bitcoin Security Scrutinized After $534 Million Stolen

Japanese bitcoin exchange, Coincheck, is inspecting its cryptocurrency exchanges following $534 million theft.

Fitness App Becomes Security Risk After Military Movement Discovered

Fitness App Becomes Security Risk After Military Movement Discovered

Strava fitness app included a heat map of movement in their newest application upgrade which could be used against military bases.

Featured

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.