Top Stories


HID Global Demonstrates Its Secure Mobile Identities and Solutions at CARTES 2014

Latest credential management and layered authentication solutions addressing enterprise and banking security will be showcased.

Hackers Breach White House Computers

Hackers Breach White House Computers

The hackers are thought to be working for the Russian government.

Milestone Systems Announces IT Distributor Partnership

Ingram Micro to distribute Milestone IP video products in Austria, Germany and Switzerland for security and IT integrators to deliver solutions based on open platform technology.



Man Still Missing from Broncos Game

Man Still Missing from Broncos Game

The 53-year-old was last seen during halftime of the Broncos vs. Chargers game

Genetec Wins 2014 Axis ADP of the Year Award for North America

Axis recognizes Genetec for its continued growth and commitment to IP video surveillance and access control technology.

AMAG Technologys Newest Symmetry V8 Software Further Developed to Support Federal Government

Government entities required to install FICAM-compliant products to meet security specifications.

Cornhusker Bank Standardizes on Genetec Security Center

110-year old bank in Lincoln, Nebraska unifies security operations across its branches.

HID Global and Datawatch Systems Showcase Mobile Access Control

Washington D.C. high-rise office building tenants can view HID Mobile Access capabilities that are integrated with other advanced building technology in special demonstration suite.

Security Situation Investigated on Flight to Charlotte

Security Situation Investigated on Flight to Charlotte

Passengers were stranded for more than an hour after their plane landed.

Jane Embury explains how skybridges, along with modern glazing systems, play a significant role in evacuations.

The Bridge of Sighs and Evacuation Models

Skybridges, along with modern glazing systems, play a significant role in evacuations.

The Rise of the Machines: M2M’s Role in Transforming Business and Security

The Rise of the Machines: M2M’s Role in Transforming Business and Security

Faced with tighter security requirements, enhanced regulatory pressure and heightened environmental concerns, businesses seek technologies that will improve overall business processes.

Twist Mobile Access Adoption Growing

Twist Mobile Access Adoption Growing

Smartphones expected to replace mechanical keys and physical access cards making user experience, value and new gestures a must.

Securitron EcoPower Power Supply Achieves Energy Savings

GreenCircle certified for up to 99% energy savings versus traditional power supplies.

Apple CEO Discusses Privacy Talks with Chinese Government

Apple CEO Discusses Privacy Talks with Chinese Government

Tim Cook said the talks were ‘very open’

Amazon Boosts Privacy Law Compliance with New Frankfurt Data Center

Amazon Boosts Privacy Law Compliance with New Frankfurt Data Center

The AWS data center hopes to help German businesses move to the cloud.

6 Halloween Safety Tips Every Adult Needs to Know

6 Halloween Safety Tips Every Adult Needs to Know

There's thousands of safety tips for children on Halloween, so parents, these are just for you!

Middle Atlantic Sets New Standard for Compact Surge Protection

Engineered with non-sacrificial and non-degrading protection to ensure system reliability by absorbing surges without contaminating system ground.

Von Duprin Concealed Vertical Cable Exit Devices Fill Church's Tall Order

Expansion and the building of new structures prompted way to secure pairs of 14-foot tall bronze doors.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.