Top Stories


Engineers Use Keyboard, Mouse and Mobile Device 'Fingerprints' to Protect Data

We've all typed in a password to access a computer network. But how secure is that? Passwords can be hacked or hijacked to get at sensitive personal, corporate or even national security data.

Memories are all Some Sandy Hook Elementary Parents Have for the Holidays

Memories are all Some Sandy Hook Elementary Parents Have for the Holidays

The word "anniversary" seems to be the wrong word to use to describe what happened a year ago this Saturday.

EET Europarts Improves Logistics Operations and Saves Money with IQinVision

EET Europarts Improves Logistics Operations and Saves Money with IQinVision

Danish distribution company relies on IP video surveillance to ensure shipping accuracy.



Ingersoll Rand Completes Spinoff of Allegion

Ingersoll Rand Completes Spinoff of Allegion

Commercial and residential security business milestone.

Lion

Lion's Share of the African Video Surveillance Market

“The size of South Africa’s network video surveillance equipment market surpassed the analog market for the first time in 2012” according to Josh Woodhouse, video surveillance analyst at IHS.

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

2 Million Stolen Facebook, Google, Twitter and Yahoo Passwords Found on Server in Netherlands

What you can do to help prevent your social media login credentials from getting stolen.

Samsung 360 Degree Panoramic 3MP Camera Combines Superior Performance and Value

Delivers wide area HD surveillance with improved TCO and RO.

OnSSI Partners with Code Blue for Comprehensive Situational Security Solution

OnSSI Partners with Code Blue for Comprehensive Situational Security Solution

Integrated system offers improved response and management control.

Fluidmesh Donates Wireless Equipment to Aid Boy Scouts of America

Fluidmesh Donates Wireless Equipment to Aid Boy Scouts of America

Scouts' STEM program receives help with science, technology, engineering and math.

Realizing the Advantages of Video Surveillance Storage and Management Solutions

Realizing the Advantages of Video Surveillance Storage and Management Solutions

Evaluating the needs of three types of organizations by analyzing their growth profiles, surveillance requirements and technology tolerance.

Happy Howl-i-days Pet Photo Contest

Happy Howl-i-days Pet Photo Contest

Help Security Today celebrate the holidays by sharing a photo of your pet with us!

Too Small to Count

Perhaps the biggest threat to small businesses is uncertainty, but don't forget credit card processing and PCI-DSS compliance.

Bulletproof Glass Pods Add More Security to Airports

Bulletproof Glass Pods Add More Security to Airports

Officers at security exits could be replaced as unmanned portals are acting as a barrier at some airports.

University Upgrades to Electronic Locks

University Upgrades to Electronic Locks

UVU upgraded its access control system to electronic locks with multi-tech readers that accommodate its newly-implemented, one-card system while providing flexibility for future generations of credentials.

Expect More Growth

Expect More Growth

Recent recessions in the global marketplace have taken its toll on numerous industries. The housing industry is only now starting to make a strong comeback, and the automotive market had a few seasons of questionable jump starts.

The Art of Security

The Art of Security

Operating a large university campus in a busy, urban setting can be challenging enough, but when the campus spans dozens of geographically-dispersed buildings that house expensive equipment and high-value student work, the challenge becomes even more complex.

Still Shaking My Head

TSA agents have had their share of troubles and missteps, but what organization hasn’t? The one thing they don’t deserve is another person shooting at them as they work on the front lines of airport security.

More than a byte

More than a Byte

Cybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities