Top News


U.S. Security Associates Coordinate Active Shooter Training Events

Helps clients and communities prepare for workplace violence and emergency situations.

WavestoreUSA Releases V5.50 Version of Video Management Software

Offers additional performance enhancements to the V5 Video Management Software Suite.

Razberi Technologies Enters Distribution Partnership with PSA Security Network

Company's growth and product development in the IP video industry leads to additional avenues of distribution.

Milestone Systems Set Sails for Nautical Markets with Partner Last Mile Communications at the Helm

Initiative to fit ships and drill rigs with advanced video systems based on Milestone XProtect.

VingCard Elsafe Takes the Family Name to Become ASSA ABLOY Hospitality

New name for trusted security brand opens the door to future growth and innovation.

Protection 1 Acquires Cam Connections, Inc.

Company is full-service systems integrator focused on high-end security solutions.

USA Freedom Act Approved by Senate and Signed by President Obama

USA Freedom Act Approved by Senate and Signed by President Obama

Phone companies to retain data while NSA must get permission from federal court.

Highlighting the Hotsheet: Cargo Theft Spikes Dramatically in Q1 2015

Highlighting the Hotsheet: Cargo Theft Spikes Dramatically in Q1 2015

Contains what's important about statistics, what you can do to help fight cargo crime and suggests the only defensible, consistent trend in cargo theft.



Campus Security Products, LLC Paves Way to Campus Safety and Security

Budget constraints not an issue with Safe@School program that brings community together to support local schools.

AMAG Technology Sponsors SIA Government Summit

FICAM compliant HSE Symmetry Security Management System demonstration in collaboration with HID Global's pivCLASS Validation Engine, Authentication Module and RK40/RKCL40 readers.

Featured

  • Report: Cybercriminals Abandon Tech Tricks for Personalized Email Deception Tactics

    VIPRE Security Group, a cybersecurity, privacy, and data protection company, has released its email threat landscape report for Q2 2025. Through an examination of worldwide real-world data, this report sounds the alarm on the most significant email security trends observed in the second quarter of 2025, enabling organizations to develop effective email security defenses for the remainder of the year. Read Now

  • AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks

    Veracode, a provider of application risk management, recently unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code. The study analyzed 80 curated coding tasks across more than 100 large language models (LLMs), revealing that while AI produces functional code, it introduces security vulnerabilities in 45 percent of cases. Read Now

  • Unlocking the Possibilities

    Security needs continue to evolve and end users are under pressure to address emerging risks and safety concerns. For many, that focus starts with upgrading perimeter openings and layering technologies—beginning at the door. Read Now

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.