Top Stories


CNL Software and Vanguard Integrated Solutions Form Technology Partnership

CNL Software and Vanguard Integrated Solutions Form Technology Partnership

CNL Software, a provider of physical security information management (PSIM), and Vanguard Integrated Solutions, a provider of security products and IP-based, integrated solutions, announced that they have formed a technology partnership.

Police Virus Infections on the Rise Reported PandaLabs

Police Virus Infections on the Rise Reported PandaLabs

The number of infections has doubled since the arrest of the cyber-gang leader in Dubai, indicating continued proliferation of insidious viruses.

More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

According to the United States House Committee on Oversight & Government Reform, over 1.1 million tax returns were filed by identity thieves for the 2011 processing year.



Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

FortiGuard Labs provide enhanced protection capability for their platforms while launching new, cloud-based sandboxing and IP reputation services to help stop advanced persistent threats (APTs).

First Ponemon Study on Big Data Analytics in Cyber Defense is a National Wake Up Call

First Ponemon Study on Big Data Analytics in Cyber Defense is a National Wake Up Call

Cyber attacks worsen, but only one in five organizations believe they are effective at stopping them.

Whitby School Appoints Emergency Response Expert

Whitby School Appoints Emergency Response Expert

Whitby School in Greenwich, Conn. has appointed 911 Consulting LLC as its emergency preparedness consultant.

Fluidmesh Announces New Staff Members

Fluidmesh Announces New Staff Members

Fluidmesh Networks welcomes Andre Duncan and Tom Goodman to the company.

HID Global Adds pivCLASS Credentials to Government Solutions

HID Global Adds pivCLASS Credentials to Government Solutions

Article Highlights: Company’s new, dual-interface smart cards for FIPS-201 physical and logical access control deployments are also on the GSA-approved product list. Credential is available as a traditional PIV-I credential for government use or as a CIV credential for a wide variety of current and emerging commercial applications.

ASSA BLOY and HID Global Will Showcase Solutions at Mobile World Congress 2013

ASSA BLOY and HID Global Will Showcase Solutions at Mobile World Congress 2013

Article Highlights: HID Global will showcase the Seos ecosystem with parent company ASSA ABLOY and its group companies’ solutions in Pod #1 in the NFC Experience Center. ASSA ABLOY group company Yale Locks will be demonstrated in the GSMA Connected City. Seos digital credentials will be used with an Oberthur Technologies dragonFly NFC SIM card and ASSA ABLOY group company VingCard Elsafe locks in the Oberthur Technologies stand 6C81, Hall 6.

Online Exclusive: Video Security Evolution

Online Exclusive: Video Security Evolution

Hybrid VMS and NVR systems are quickly gaining popularity. Hybrid recording systems directly connect to existing analog cameras and allow for an easier and more cost effective transition from analog cameras to IP.

McAfee Mobile Study Documents Sophistication of Risky Apps

McAfee Mobile Study Documents Sophistication of Risky Apps

McAfee released the results of its “Mobile Security: McAfee Consumer Trends Report,” documenting sophisticated and complex, risky apps containing multi-faceted scams, black market crimes, drive-by downloads and near-field communication threats. The report identifies a new wave of techniques hackers use to steal digital identities, commit financial fraud, and invade users’ privacy on mobile devices.

Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace

Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace

The weakest link in many computer networks may just be the gullible human.

Quantum Cryptography Put to Work for Electric Grid Security

Quantum Cryptography Put to Work for Electric Grid Security

A Los Alamos National Laboratory quantum cryptography (QC) team successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography.

ABI Research Forecasts Dual Interface and Pure Contactless Smart Cards

ABI Research Forecasts Dual Interface and Pure Contactless Smart Cards

Over the next three years, ABI Research expects to see a shift in the penetration ratio of pure contactless and dual interface shipments.

Delta Scientific MP5000 Portable Crash Barriers Used at Presidential Inaugural

Delta Scientific MP5000 Portable Crash Barriers Used at Presidential Inaugural

MP5000 barriers are able to stop 7.5 ton (6400 Kg) vehicles traveling 40 mph (48 kph).

Who is Hacking into US Critical Infrastructures

Who is Hacking into US Critical Infrastructures

The U.S. Department of Homeland Security has released a statement that cyber-attacks on critical U.S. infrastructure have jumped 52% compared to last year.

Steve Casey Joined Sielox as Senior Vice President COO and Partner

Steve Casey Joined Sielox as Senior Vice President COO and Partner

Casey, who has an equity stake in the company, will manage product development, operations and customer service for Sielox.

Biggest Milestone Integration Platform Symposium Ever

Biggest Milestone Integration Platform Symposium Ever

‘Think Bigger’ theme at an annual partner event motivates innovative partnerships.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.