Top Stories


Cybercriminals Target Broad Range of Victims in January

January saw malware attacks targeting a wide range of potential victims, including gamers looking for a Pro Evolution Soccer 2012 game crack, small business owners concerned about the reputation of their business, and government organizations receiving spoofed messages from the United States Computer Emergency Readiness Team (US-CERT).

Students Design Virtual I.D. Badge to Combat Online Hackers

A student entrepreneurial team at the University of Utah believes it has come up with a winning business plan for a virtual ID badge that operates off of any mobile device. The team, calling itself EMRID Technologies, developed a product that could be used in place of other common electronic ID badges used by hospitals, defense companies or other firms where securing data is of the utmost importance.

Critical Infrastructures Built to Withstand Almost Anything

In an ideal world, every tunnel, train terminal, and critical building would be built like a fortress to withstand any emergency. But in the real world, construction costs matter and engineers "build to code." While Americans can take comfort that their critical infrastructure meets minimum codes for safety, when terror—or nature—hits especially hard, minimum codes provide minimal comfort.



Antennaless RFID Tags Developed at NDSU Solve Problem of Tracking Metal and Liquids

Tracking and identifying metal objects can prove difficult for some radio frequency identification (RFID) systems. A patent-pending technology developed by a research team at the Center for Nanoscale Science and Engineering (CNSE) at North Dakota State University, Fargo, could solve these RFID tracking problems. The antennaless RFID tag developed at CNSE could help companies track products as varied as barrels of oil to metal cargo containers.

The Value of an Urban Blast Tool

Thanks to lightning-fast software from the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), if a truck bomb was discovered in Lower Manhattan we will now be able to predict the likely damage patterns in the surrounding areas, and prioritize the first responders’ activities long before the bomb’s acoustic shockwave ricocheted out at the speed of sound.

Greater Congressional Oversight Will Improve CFATS Implementation

Greater Congressional Oversight Will Improve CFATS Implementation

As a key congressional panel examined the implementation of the nation’s chemical security rules, the Society of Chemical Manufacturers and Affiliates (SOCMA) expressed its support for stronger federal oversight...

Michigan Man Arrested for Illegally Streaming Live Sporting Events Over the Internet

Yonjo Quiroa, 28, of Comstock Park, Mich., was arrested Wed., Feb. 1, charged with criminal copyright infringement related to a website operation that illegally streamed live sporting event telecasts and pay-per-view events via Internet.

DHS Partners with NFL for Super Bowl XLVI

“Our partnership with the NFL on the “If You See Something, Say Something” public awareness campaign during the Super Bowl is a critical part of our efforts to ensure the safety of every employee, player and fan.”

HFES Offers Tips on Improving Website Password Practices

In an upcoming article from the Human Factors and Ergonomics Society (HFES), human factors/ergonomics researchers identify impediments to efficient password creation and provide design strategies for enhancing the user experience.

First Receivers Staying on Top of Their Game

There are first responders, of course, those who arrive first on the scene of an incident and who play a critical role in emergencies involving injuries and casualties, but, there are also first receivers who primarily operate in hospitals. These professionals are increasingly expected to be well versed in other public safety domains in preparation for disastrous events.

Stereo Cameras Detect Pedestrians from Within a Car

Researchers have developed a system that locates pedestrians in front of the vehicle using artificial vision.

An Emergency Network for Natural Disasters

Engineering researchers at the University of Arkansas are developing an emergency communications network that will maintain operation during natural disasters and provide critical warnings and geographic information to people affected by the disasters. The researchers are honing and testing the system now and expect to deploy a pilot network at the end of 2012.

The DLR Standard

Many security professionals have used the DLR standard to conduct security operations. Personal recognition is the most accurate form of identification; use of the DLR standard is at the other end of the identification spectrum.

ObjectVideo, Tyco Security Products' American Dynamics Business Unit Enter into Patent Licensing Agreement

ObjectVideo, Inc., announced today the signing of a global patent licensing agreement with Tyco Security Products’ American Dynamics business unit. This agreement provides American Dynamics access to ObjectVideo’s portfolio of video analytics patents as American Dynamics develops and launches a wide-range of its own video analytics software and hardware products.

Reaching Each Milestone On Time

The IT division’s network team at WKU implemented Milestone’s open platform video management software, XProtect Corporate.

Credit Union Gets Good Grades

Teachers Credit Union, headquartered in South Bend, Ind., is the largest credit union in the state, reaching from inside the Michigan border from Niles, Mich., to Greenwood, Ind.

Las Vegas Store Secure with Moonblink

One retail store on the Las Vegas Strip now has a higher level of security thanks to Moonblink Communications.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.