Top Stories


At Least 10 Injured at California Rally

At Least 10 Injured at California Rally

At least 10 were injured when a white supremacist group and counter-protesters clashed at a rally on the Sacramento Capitol steps Sunday, June 26.

Vanderbilt SMS Streamlines Access, Integrates Multiple Systems for Historic Ripon College

It was critical for Ripon to deploy a comprehensive safety and security program that streamlined access management across the expansive campus.

German Cinema Attacker Killed by Police after Hostage Situation

German Cinema Attacker Killed by Police after Hostage Situation

German police shot and killed a rifle-wielding man Thursday after he open fired in a movie theater and took hostages.



Online Exclusive: Managing Control System Access with an ID Card Solution

Automation and data solutions provider uses ID cards in an innovative way.

Dave Larson, COO of Corero Network Security, discusses DDoS attacks.

Online Exclusive: DDoS Attacks Fuel the Need for Modern Protection Methods

DDoS attack prevention is nearly impossible: it’s difficult to track down hackers, whereas it’s easy and inexpensive to launch a DDoS attack.

Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.

Dortronics Fills New Position of A&E Sales Coordinator

Dortronics today announced that Skip Burnham has joined the company to fill the newly created position of coordinating sales efforts through architects, engineers and specifiers.

A Breakdown of the Nation’s Unsecured Security Cameras

A Breakdown of the Nation's Unsecured Security Cameras

A security firm analyzed open security cameras and concluded which U.S. cities have the most unsecured cameras in use.

Airport Security Could Suffer from Brexit

Airport Security Could Suffer from Brexit

If Britain decides to leave the European Union, British airports may see a slump in security.

Louroe Electronics Showcases Live Gunshot Detection Demonstration

Louroe Electronics Showcases Live Gunshot Detection Demonstration

Schools, law enforcement and other institutions to experience first-hand the benefits and ease-of-use of cutting-edge audio analytics technology.

Security in Rio Questioned After Olympian Mugged

Security in Rio Questioned After Olympian Mugged

Australian Olympian, Liesl Tesch, was mugged outside the athlete accommodations in Rio.

Alternative Fire Alarm Reporting Communications Solutions for New & Old Systems:  Offer Monthly Savings & Meet New NFPA 72 Code

Alternative Fire Alarm Reporting Communications Solutions for New & Old Systems: Offer Monthly Savings & Meet New NFPA 72 Code

Under the latest 2016 edition requirements for Fire System Monitoring has changed drastically. The three options to keep current for fire system monitoring are two telephone lines requiring special, site specific AHJ approval; a single phone line plus another independent form of communications, or a Sole Path Fire Communicator or Equivalent.

FBI Release Timeline and Transcript of 911 Calls from Pulse Nightclub Shooting

FBI Release Timeline and Transcript of 911 Calls from Pulse Nightclub Shooting

Orlando Police and FBI released information about the sequence of events during the shooting that killed 49 and injured 53 more.

Thousands of Credit Cards Stolen from Acer Online Store

Thousands of Credit Cards Stolen from Acer Online Store

Acer has admitted to a data breach that affects more than 30,000 customers.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

Security Products Dad Will Love

Security Products Dad Will Love

Father’s Day is just around the corner; give Dad the gift of security with one of these products.

Plastic Surgeon Selects IDIS for Enhanced Security

Next-Generation IDIS Solution ensures robust safety and security environment for both patients and staff.

British Politician Dies after Attack in Birstall

British Politician Dies after Attack in Birstall

British Politician Jo Cox was attacked on June 16 in Birstall. She later died of her injuries.

Featured

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities