Top Stories


Genetec Announced General Availability of Synergis Master Controller

Genetec Announced General Availability of Synergis Master Controller

A new, intelligent, IP, door controller addresses longstanding customer demand for non-proprietary access control solutions.

Do not stage your vehicle to be stolen

Many auto thefts are crimes of 'opportunity.' Leaving the keys in your car (even a 'hidden' spare key) greatly increases your chances of having your car stolen.

IQinVision Named a Premier Vendor by PSA Security Network

IQinVision Named a Premier Vendor by PSA Security Network

“I am excited to announce that IQinVision has qualified as a premier vendor and has joined the ranks in our Premier Vendor Program” said Craig Patterson, director of vendor management with PSA.



CNL Software and Vanguard Integrated Solutions Form Technology Partnership

CNL Software and Vanguard Integrated Solutions Form Technology Partnership

CNL Software, a provider of physical security information management (PSIM), and Vanguard Integrated Solutions, a provider of security products and IP-based, integrated solutions, announced that they have formed a technology partnership.

Police Virus Infections on the Rise Reported PandaLabs

Police Virus Infections on the Rise Reported PandaLabs

The number of infections has doubled since the arrest of the cyber-gang leader in Dubai, indicating continued proliferation of insidious viruses.

More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

According to the United States House Committee on Oversight & Government Reform, over 1.1 million tax returns were filed by identity thieves for the 2011 processing year.

Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

FortiGuard Labs provide enhanced protection capability for their platforms while launching new, cloud-based sandboxing and IP reputation services to help stop advanced persistent threats (APTs).

First Ponemon Study on Big Data Analytics in Cyber Defense is a National Wake Up Call

First Ponemon Study on Big Data Analytics in Cyber Defense is a National Wake Up Call

Cyber attacks worsen, but only one in five organizations believe they are effective at stopping them.

Whitby School Appoints Emergency Response Expert

Whitby School Appoints Emergency Response Expert

Whitby School in Greenwich, Conn. has appointed 911 Consulting LLC as its emergency preparedness consultant.

Fluidmesh Announces New Staff Members

Fluidmesh Announces New Staff Members

Fluidmesh Networks welcomes Andre Duncan and Tom Goodman to the company.

HID Global Adds pivCLASS Credentials to Government Solutions

HID Global Adds pivCLASS Credentials to Government Solutions

Article Highlights: Company’s new, dual-interface smart cards for FIPS-201 physical and logical access control deployments are also on the GSA-approved product list. Credential is available as a traditional PIV-I credential for government use or as a CIV credential for a wide variety of current and emerging commercial applications.

ASSA BLOY and HID Global Will Showcase Solutions at Mobile World Congress 2013

ASSA BLOY and HID Global Will Showcase Solutions at Mobile World Congress 2013

Article Highlights: HID Global will showcase the Seos ecosystem with parent company ASSA ABLOY and its group companies’ solutions in Pod #1 in the NFC Experience Center. ASSA ABLOY group company Yale Locks will be demonstrated in the GSMA Connected City. Seos digital credentials will be used with an Oberthur Technologies dragonFly NFC SIM card and ASSA ABLOY group company VingCard Elsafe locks in the Oberthur Technologies stand 6C81, Hall 6.

Online Exclusive: Video Security Evolution

Online Exclusive: Video Security Evolution

Hybrid VMS and NVR systems are quickly gaining popularity. Hybrid recording systems directly connect to existing analog cameras and allow for an easier and more cost effective transition from analog cameras to IP.

McAfee Mobile Study Documents Sophistication of Risky Apps

McAfee Mobile Study Documents Sophistication of Risky Apps

McAfee released the results of its “Mobile Security: McAfee Consumer Trends Report,” documenting sophisticated and complex, risky apps containing multi-faceted scams, black market crimes, drive-by downloads and near-field communication threats. The report identifies a new wave of techniques hackers use to steal digital identities, commit financial fraud, and invade users’ privacy on mobile devices.

Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace

Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace

The weakest link in many computer networks may just be the gullible human.

Quantum Cryptography Put to Work for Electric Grid Security

Quantum Cryptography Put to Work for Electric Grid Security

A Los Alamos National Laboratory quantum cryptography (QC) team successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography.

ABI Research Forecasts Dual Interface and Pure Contactless Smart Cards

ABI Research Forecasts Dual Interface and Pure Contactless Smart Cards

Over the next three years, ABI Research expects to see a shift in the penetration ratio of pure contactless and dual interface shipments.

Delta Scientific MP5000 Portable Crash Barriers Used at Presidential Inaugural

Delta Scientific MP5000 Portable Crash Barriers Used at Presidential Inaugural

MP5000 barriers are able to stop 7.5 ton (6400 Kg) vehicles traveling 40 mph (48 kph).

Featured

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.