Top Stories


Per Mar Security Services Acquires Southlake Security in Griffith Indiana

Per Mar Security Services is pleased to announce it has acquired Southlake Security in Griffith, Indiana further expanding its security services and customer base in Northwest Indiana.

Security at Manchester Benefit Concert Expected to be Tight

Security at Manchester Benefit Concert Expected to be Tight

Ariana Grande and company are playing a benefit concert to raise funds for the victims of the Manchester Arena bombing. Here’s how they’ll keep it safe.

Security Strategy

Security Strategy

While many security teams at retailers are concerned about the potential for a big data breach, everyday security threats, like social engineering and shoplifting, are heightened in a world of omni-channel retail.



Raising the Bar

Raising the Bar

The Beer Cellar, located in Glen Ellyn Park, Ill., recently transitioned to a new storefront that not only provided expanded business opportunity but also required added safety and security measures in a busy and highly functional space.

Filling the Gap

Filling the Gap

When seconds count in an emergency, such as an active shooter or severe weather, gaps in communication can cost lives. Many schools, businesses and healthcare facilities face the challenge of ensuring comprehensive coverage with their existing emergency mass communication systems.

The Right Combination

The Right Combination

With a pending network overhaul and the fast-approaching emergency exercise, Pangborn Memorial Airport was driven to action.

Secure the Perimeters

Secure the Perimeters

The National Park Service has an extensive security protocol for its numerous locations nationwide, though they do stress an extensive layered approach.

Building in Security

Building in Security

A family-oriented municipality with a thriving business environment, the city of Cypress is home to 48,000 residents in North Orange County, Calif.

Team Work

Sometimes you need to be in the right place at the right time. Sometimes, it’s who you know. For Karrie Gabbard, executive director of the East Butler County Family YMCA in Hamilton, Ohio, it was both.

Data Secure

The risk posed by hackers to the Internet of Things (IoT) is a hot topic and there have already been some serious real-world attacks.

Protecting the Puppets

The Center for Puppetry Arts commissioned Atlanta’s Operational Security Systems (OSS) to provide security including access control for both phases of the construction project. The challenge included many key components.

Random Campus Tragedies are Painful

An active shooter on campus has no rhyme or reason. When something stupid like this happens, everyone’s first question is: Why? Followed by: What was the motive?

The Best Defense

Not a Catch-all

Not a Catch-all

When used effectively, biometrics can contribute to safer cybersecurity practices.

Force Multiplier

Force Multiplier

Port Angeles, located on the U.S.-Canada border, is host to a thriving maritime port and a significant customs entry point into the United States.

Business Intelligence

Business Intelligence

Many industries have successfully implemented video surveillance and management systems in their manufacturing facilities as a way to reduce the risk of theft or vandalism.

Georgia Law Allows Guns at University Tailgate Events

Georgia Law Allows Guns at University Tailgate Events

A new Georgia law allows guns at public university tailgating events but not inside the sporting arenas.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.