Top Stories


CyberLock Develops System to Help Water Utilities Meet EPA Guidelines

CyberLock Security Systems is working to help water utilities meet EPA guidelines for protecting watersheds and sources of drinking water.

TriEd and Northern Video Distribution Partnering With VideoIQ

Tri-Ed/Northern Video Distribution is partering with VideoIQ, a leading innovator in intelligent video analytics and surveillance. .

Department of Homeland Security to Test U.S. Bridges for Vulnerability

The Department of Homeland Security’s Science and Technology Directorate (S&T) has joined forces with the Federal Highway Administration and the U.S. Army Corps of Engineers Engineer Research and Development Center to conduct series of experiments that assess potential vulnerability of critical structural components of aging steel bridges.



New Technology Could Help Thwart Nuclear Terrorism

Attacks involving nuclear devices or materials are among the terrorism scenarios that raise the most concern. For that reason, technology that can effectively detect smuggled radioactive materials is considered vital to U.S. security.

Anti-Malware Lab Report Says Four out of Five Malware Samples are Trojans

Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.

Israeli Bank Selects NICE Technology

NICE announced recently that Israeli bank, Bank Mizrahi Tefahot, selected the new NiceVision banking solution to secure its branches and ATM systems located throughout Israel. The new NiceVision banking solution captures video recordings inside branches and from ATMs for fraud detection and claim settlement, and allows for easy access and retrieval of video evidence -- supporting compliance with law enforcement requirements.

Report: Mobile Use of Social Networking Becoming Preferred Way to Infect Mobile Devices

AVG Technologies recently released its Q1 2012 Community Powered Threat Report. The report highlights the growing use of mobile devices to connect with social networks and how this is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices running Android.

Major U.S. International Airport Expands Use of Smarter Security Technology

Smarter Security Inc. recently announced that one of the country’s Top 25 largest airports recently expanded its use of the company’s Door Detective CL to better secure employee-only doors and elevators in the airport terminal.

Tips: Protect Against Fake Antivirus Programs

Antivirus programs are typically recommended by computer sales professionals, but it is important to know about fake antivirus programs and how you can protect yourself and your computer against them.

Preserving Musical Heritage

As the crown jewel of the rich artistic and cultural heritage of Rome, the Academy of Santa Cecilia is one of the oldest and most important musical institutions in the world. Its position and fame have steadily grown since it was founded in 1585. Today, it is internationally renowned, both as a venue for symphony orchestra concerts and as the custodian of a heritage of inestimable value, which makes it a landmark for academics and music lovers alike.

A Wise Investment

Monticello Bank, a 12-branch community bank in Kentucky, had an outdated analog surveillance system in place that limited capabilities and required the bank to hire a thirdparty vendor for analog video installation and maintenance services.

Rolling Out Successful Security

Securing the Past

Patna Museum is recognized as one of the greatest museums in India.

Expecting More Growth This Year

Every so often, I get lucky and find myself at the right place at the right time, hopefully doing the right things. For many years I’ve experienced this within the security industry.

Security On The Fly

How significant is the mobile application market around the world today? You just need to look at some of the numbers to understand how widespread mobile apps have become, even in the physical security market, and how adoption of mobile phones, tablets and other smart devices that are used with these apps has gone from leading-edge to commonplace.

Book Examines Research on Eyewitness Identification to Improve Criminal Justice Practice

Eyewitness evidence plays a critical role in at least 77,000 criminal cases each year in the United States, but it has become commonplace to call that evidence inaccurate. In a new book by a University of Arkansas psychologist and his colleagues, the issue of accuracy is presented as more complicated and mutable.

Mandate for Mass Notification

The parents of two former Virginia Tech students have won a $4 million jury-awarded lawsuit resulting from the deaths of their children, Erin Peterson and Julia Pryde.

Taking Off

Today’s progressively faster pace of life rationalizes the thirst for near-constant connectivity.

Featured

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities