Top Stories


Professional Recommendations

Digital transformation is changing the way we do business and COVID-19 accelerated this shift. Organizations that had not already moved data to the cloud, rushed to do it, while others accelerated their shift from on-premise to cloud.

Heightening Field Operations

Heightening Field Operations

Security operations centers are undergoing dramatic changes as operators add hundreds of sources, systems and devices, creating a cacophony of alarms – enough to overwhelm the best-trained staff.

Unique Hiring Demands

Unique Hiring Demands

Mitigating risks and threats along with extensive intelligence analysis are at the core of comprehensive and effective customized executive protection programs.



Keeping Your Eye on the Ball

Potential security threats keep evolving. It’s a distressing reality that we continually need to adapt to—one that particularly weighs heavily on the minds of stakeholders at major sports venues as they explore security solutions to prevent drone, vehicular and other dangerous assaults.

The Case for Access Control

Security experts agree that the three most important components of a physical security plan are access control, surveillance and security testing, which work together to make a space more secure.

Landmark Security

How do you secure the largest cathedral in the world when it sits on 11.3 acres, is considered a New York City landmark, and is a busy destination for worship, cultural arts, social services and tourism?

Discussing Security

The proliferation of smart edge devices that aggregate data and interoperate with other devices and systems on the network, is also fueling this migration by delivering additional sources of data that can help to streamline workflows, build efficiencies and save costs along with numerous other benefits.

Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

IBM Security recently released the annual Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations.

A Business Owner’s Demand

A Business Owner’s Demand

Business owners are making the move to higher resolution cameras at a pace that defies the influences of the pandemic, supply chain challenges, and labor shortage, according to a new 2022 worldwide security camera report.

Expanding Safety-Sensitive Roles to Address Cyberattacks

The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners.

The Key to Preventing Production Network Attacks Is to Start Looking Within

The business of cybercrime is rapidly increasing in scope and scale. The cost incurred by companies due to data breaches increased by nearly 10 percent from 2020 to 2021, meaning if the cost incurred by attacks was measured against the GDPs of all the nations of the world, it would be third largest, just lagging behind the U.S. and China.

Protecting the Infrastructure

Protecting the Infrastructure

Critical infrastructure facilities can be quite large, so protecting them is a complex challenge that demands multifaceted solutions. Robust, cybersecure technology solutions exist to protect facilities of all sizes and types but getting the most out of these solutions requires attention to the human element as well.

The Ongoing Value of VSaaS

The Ongoing Value of VSaaS

Subscription-based service models are increasing in the security industry. Shifting to video subscription as a service (VSaaS) or SaaS in general involves changing the mindset that one is receiving a service rather than a product. What end users want is a system that is always current rather than a product that can quickly become out of date or is not functional when it matters most.

Adding Audio to ROI Programs

Adding Audio to ROI Programs

Across the globe, security teams are under pressure to justify what they do and how they do it. They need to continually make a strong case to internal and external shareholders for their budgets and activities.

Place Your Bets

Place Your Bets

For a casino, constant threats of theft, hacking, and fraud from guests and employees are simply table stakes. The combination of high-volume visitor traffic and significant amounts of cash can create potential security nightmares, with the cards often stacked against the house.

Woman Shot and Injured After Firing Gun At Dallas Love Field Airport

An armed woman fired several shots at the ceiling at Dallas Love Field on Monday morning before being injured by a police officer.

Playing the "A" Game

Playing the "A" Game

The cardboard fans are gone and the real fans are back, making up for lost time. They are packing stadiums, the bars and restaurants surrounding them. They’re not just going to the games. Sports venues have stretched beyond the stadium proper to incorporate pavilions and entertainment complexes, owned and managed by the franchises that feature retail, hotels, theaters and much more.

Securitas Acquisition of STANLEY Security and Healthcare Now Complete

The highly anticipated acquisition of STANLEY Security and Healthcare accelerates Securitas’ transformation journey toward technology-based solutions and its ambition to position itself as an outstanding global security and safety partner that helps make the world a safer place.

Featured

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.