Top Stories


See What You’re Missing

Fraud prevention, it’s time to get better acquainted with your security team. You may see them in the hallways, have a coffee with them in the breakroom, and possibly join them on the dance floor at your annual holiday party.

Alarming Trend with Police

I’ve been writing, professionally, for 40 years. The first story that I ever worked on was a triple homicide, and a contract murder that was related. Back then, I didn’t think reporting could get any worse.

Stop Lingering

Security threats are on the rise and as IT security teams increase their scrutiny of all network-connected devices, it’s time for some new thinking about the design and maintenance of building security systems.



Security by the Book

Security by the Book

Pick any county in the United States, money is scarce to non-existent, and in the pecking order of who gets the available money, the county library is way down the line.

The Connected World

The Connected World

The abundance of networked solutions and devices—both security and nonsecurity— has exploded in recent years, providing unparalleled convenience and efficiency.

Emergency Security

Based in Milwaukee, Wisconsin, Bell Ambulance Company has been in operation since 1977, growing into the largest provider of ambulance services in the state. The company responds to around 75,000 calls per year and provides a range of services.

Triggers for Transition

It can be difficult to decide whether and when to make the transition to new access control technology. Transitions are often delayed over budget concerns or because of worries that the process will adversely impact productivity and workflow.

Dissecting the Advantages

Physical identity access management (PIAM) solutions have changed the way leading organizations approach security.

Terminal Upgrade

Terminal Upgrade

Terminal One at JFK International Airport had relied on a limited analog surveillance system and a separate, older IP system that were independent of each other.

Port-ability

When it comes to protecting transportation hubs, seaports have their own set of challenges.

Oklahoma Sheriff to Deploy Body Cameras after 2015 Fatal Shooting

Oklahoma Sheriff to Deploy Body Cameras after 2015 Fatal Shooting

In 2015, an ex-deputy shot and killed an unarmed black man.

Everything You Need to Know about the Travel Ban

Everything You Need to Know about the Travel Ban

On Friday, January 27, President Trump signed an executive order that excluded travel from seven countries.

6 Dead in Quebec Mosque Shooting

6 Dead in Quebec Mosque Shooting

A group of gunman entered a mosque in Quebec and open fired killing six.

Moni Smart Security Introduces Customer Bill of Rights

Company Leads Change in Customer Interaction with Home Security Providers

Dallas Police Department Gets $1 Million for Protective Gear

Dallas Police Department Gets $1 Million for Protective Gear

Governor Greg Abbot announced the funds would be given to the police department so they could outfit officers with new helmets, bullet proof vests.

Tight Security Surrounding GOP Retreat in Philly

Tight Security Surrounding GOP Retreat in Philly

Philadelphia is stepping up security as President Trump arrives for the GOP Retreat.

'Torture Works' President Trump to Revive Practice?

A draft order outlining many things including the revival of torture was published Wednesday.

President Trump’s Executive Orders on Border Security

President Trump's Executive Orders on Border Security

President Trump is expected to sign two executive orders on Wednesday relating to border security.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.