Top News


Feenics Appoints Cosgrove as Midwest Regional Sales Manager

Bringing wide-ranging physical security experience in both the system integrator and software manufacturing sales disciplines, Dan Cosgrove has been appointed Midwest US Regional Sales Manager for Feenics, Ottawa, Canada.

Managing Non-Human Identity Explosion in the Public Cloud

With digital transformation comes the move to the cloud. What many businesses don’t realize is that it requires a retooling of their security strategy from the ground up.

Cyber Deception Reduces Data Breach Costs by Over 51% and SOC Inefficiencies by 32%

Attivo Networks® has announced the results of a new research report conducted with Kevin Fiscus of Deceptive Defense, Inc., “Cyber Deception Reduces Breach Costs & Increases SOC Efficiency.”

Davista Social Distancing Solutions Ensures a Safe Return to Work

AI-based platform and mobile application delivers the value of data to transform health monitoring during COVID-19

McAfee Brings Consumers an Integrated Security Experience from Home

McAfee today announced its latest consumer security portfolio that includes enhanced products with better user experiences such as a native VPN and new features, including integrated social media and tech scam protection.

The Role of Confidential Computing in Protecting Cloud Applications and Sensitive Data from Breaches

According to the Confidential Computing Consortium: “Confidential computing is the protection of data in use using hardware-based Trusted Execution Environments (TEE).

All States Now Compliant Ahead of REAL ID Deadline

The Department of Homeland Security (DHS) is announcing that after more than 15 years since Congress passed the REAL ID Act, all 50 states are now in full compliance issuing these cards, with most states becoming compliant in the last four years.

DHS to Implement Strategic Framework for Countering Terrorism and Targeted Violence

In September 2019, the Department of Homeland Security (DHS) issued its Strategic Framework for Countering Terrorism and Targeted Violence (CTTV Framework) and now offers this corresponding Public Action Plan demonstrating the Department’s efforts to combat emerging threats and improve information sharing.



police standing in a group

Law Enforcement Data “Blue Leaker”: A Danger or a Public Service?

The recent release of a massive cache of sensitive Law Enforcement data has been in the news recently. The trove of roughly 270 gigabytes of data posted to the Denial of Secrets website has been referred to as “BlueLeaks."

Body Cameras Must be worn by California Prison Guards

Body Cameras Must be worn by California Prison Guards

A federal judge mandate will make sure that California correctional officers will now be required to use body cameras while interacting with inmates inside a state prison.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.