Top Stories


What Happens When Your Employees

What Happens When Your Employees' Equipment Is Left Unattended?

The Importance of Locking Down Multiple Devices in the Office

Security Industry Rallies to Help Harvey Victims

Security Industry Rallies to Help Harvey Victims

Manufacturer Rep Firm LRG inc and their vendor partners have started a pledge drive to directly assist electronic security personnel and their families that were severely affected by Hurricane Harvey.

SDC Launches $2,500 Door Package Giveaway

SDC has added a new, labor-saving function called DoorSnap to its free, award-winning SDCSecurity App.



Vegas Airport to Upgrade Security Features

Vegas Airport to Upgrade Security Features

A new, innovative screening process was unveiled, and the Transportation Security Administration, with the help of Clark County, just proposed a grant of more than $10 million for other security upgrades.

Private Security Outnumber Police Around the World

Private Security Outnumber Police Around the World

In at least half of the world’s countries, private security workers outnumber police officers. More than 40 countries, including the United States and the United Kingdom, have more guards privately hired to protect certain people, places and things than police officers whose duty it is to protect the public.

Vicon Expands A&E Services Team

Vicon announced the expansion of its A&E Services division, with the addition of David Busco, who will manage Vicon’s relationships with the A&E community throughout the eastern United States.

Join Mission 500 for the Security Softball Game

Help Mission 500 reach their fundraising goal of $75,000 at the third annual Security Softball Game.

3VR Hires Security Veteran Douglas Florence as Western Sales Director

Florence brings deep experience in security, surveillance, business continuity planning, and investigation operations in gaming, retail, and corporate security.

Vulnerabilities Revealed in AT&T Modems

Vulnerabilities Revealed in AT&T Modems

Gaping security holes have been discovered in most AT&T U-verse cable modems that would allow remote cyber criminals to access a household’s internet connection as well as any devices connected to it.

Eight Injured After Car Crashes into Crowd in Philadelphia

Eight Injured After Car Crashes into Crowd

The driver, whose SUV hopped the sidewalk, sending it straight into partygoers, will be charged with DUI.

High Assurance Credentialing

High Assurance Credentialing

Moving to higher ground within the commercial enterprise space.

Instagram Alerts High-Profile Users of Possible Hack

Instagram Alerts High-Profile Users of Possible Hack

The Facebook-owned social media company sent an email to high-profile users on Wednesday alerting them that a bug in its software may have allowed users’ account data to be accessed.

Venice Film Festival Increases Anti-Terror Security

Venice Film Festival Increases Anti-Terror Security

Extra security measures are being taken at this year’s Venice Film Festival following the recent deadly terror attack in Barcelona, Spain.

The IoT and Security: 3 Strategies Every Pro Must Know

The IoT and Security: 3 Strategies Every Pro Must Know

Law enforcement and security professionals can benefit from the IoT — and not just to watch people more closely. Follow these three steps to prepare for the IoT reality, protect your own vulnerabilities, and find creative solutions to your investigative problems.

In the Clouds

In the Clouds

Cloud solutions are changing the way businesses operate at almost every level. Their ease of implementation, access from anywhere and cost-effective pricing are making them the preferred solution for everything from marketing platforms to payroll administration to project management.

Blue Book for Success

Anixter has a Blue Book that serves as a corporate bible; Pat Comunale, president of Anixter’s global security solutions, believes in the book from the first page on, and it would seem the Blue Book is, as he notes, second to none.

Landing the Proper Security

Landing the Proper Security

Events in recent history concerning attacks on transportation hubs have increased the importance of safeguarding airports around the world and further highlighted the need for accurate, reliable and smart security systems to protect aviation assets.

Cash in Hand

Cash in Hand

If your bank, credit union or non-bank organization operates ATMs in remote locations, such as convenience stores or shopping malls, a bank heist that occurred in Japan last year probably caught your attention.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.