Top News


More Than 26,000 Twitter Accounts Linked to ISIS

More Than 26,000 Twitter Accounts Linked to ISIS

A cybersecurity activist developed the roster, but it has flaws.

Quantum Secure Now Part of HID Global

Acquisition complements and extends portfolio while application driven software solution helps customers meet identity management and compliance requirements.

On Cloud 9 - Campuses need effective security equipment

On Cloud 9

Perhaps more than any other time in history, school campuses need effective security equipment and tools not only to ensure the physical safety of students, teachers, staff and administration but also to create a safe environment where effective learning takes place as well as manage expensive assets, such as computer equipment, from theft or damage.

Multiple Options for Demanding Applications

Multiple Options for Demanding Applications

Advances in communication technology are opening doors in the field of access control locks.

Hospital Complex Cultivates Healthy Fire Protection

Hospital Complex Cultivates Healthy Fire Protection

A decade ago, St. Peter’s Hospital in Albany, N.Y., started a $259 million campus-wide modernization project.

All in a Day’s Work

All in a Day’s Work

Many years ago, when I decided to become a journalist, I started cutting my teeth by writing sports. I was pretty young at the time, and I enjoyed a variety of sports. It was a perfect training ground for me.

The Right Recipe

The Right Recipe

If there’s any doubt about the value of live monitoring as part of an effective home security system, consider a self-monitored system that sends an alert only to the homeowner.

Understanding Carbon Monoxide Laws Codes and Standards

Understanding Carbon Monoxide Laws Codes and Standards

In the United States alone, this invisible intruder, carbon monoxide (CO), is responsible for sending thousands of people to the emergency room each year with CO poisoning, some resulting in death.



Time to Take Advantage

Time to Take Advantage

For every organization, one of the first steps in providing safety and security is knowing at all times who is in the building. This is true for protecting people, property, or assets, and whether the building is a business, school, hospital or any other location.

Live Longer

Live Longer

Americans want to be safe and the FCC is helping. The FCC reserves valuable radio frequencies for public safety authorities that can be used for Ultra-Reliable wireless video surveillance.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.