Top News


Who’s on Deck?

Who’s on Deck?

When nurses head home after a grueling 12-hour shift, the last thing Carolinas HealthCare System (CHS) wants them to worry about is getting to their cars safely.

Educating Without Surveillance

Educating Without Surveillance

According to Saddleback College Chief of Police, Christopher Wilkinson, the childcare center in particular was a top priority due to concerns related to the Sandy Hook Elementary tragedy and other similar violent incidents.

Government Procurement Challenges

Government Procurement Challenges

More than likely, you have witnessed an RFP that includes dated product specifications and, in some cases, multiple product specifications that are more “wish-list” than reality.

Rush to Security

Rush to Security

When Rush University Medical Center incorporated wireless electronic locks throughout its new 375-bed-tower hospital building, it made installation easier and more cost-effective while providing greater flexibility to meet future security needs.

Dedication Not to Be Taken Lightly at ISC West 2014

Dedication…I have been pondering this word since non-morning person, me, booked my flight to ISC West 2014 at 5:30am on March 12, 2014! Oh yes, Starbucks will definitely be my friend as I wake up at 2:15am on Wednesday morning to fly from Dallas to Houston and then from Houston to Las Vegas to make my first appointment of the day at 10:00am.

High-Tech Solutions

High-Tech Solutions

Nearly everyone is familiar with the standard manned guard booth in which a person sits and allows drivers in and out of a facility; however, border stations, government buildings, military bases and other locales where there can be a “very unwanted guest” all use much highertech security booths.

Raising Concerns

Raising Concerns

Wireless transmission is usually a topic that raises many concerns in the security world. It seems common knowledge nowadays that a wireless network can be easily hacked, and private information can end up on the Internet or someone’s identity can be stolen.

College Upgrades

College Upgrades

Reflecting the uniqueness and diversity of the local Queens’ community, for more than 50 years, Queensborough Community College has served students from Queens and the entire New York City region as a starting place to pursue their academic and career goals.



Building a Secure Cloud Environment A secure IT strategy often emerges as a key concern

Building a Secure Cloud Environment

When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

One might think that a military base is among the most secure places in the country. Unfortunately, though, the sprawling nature of military bases makes them difficult to secure effectively, which leaves these sites vulnerable to a wide range of threats.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.