Top News


Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

Fortinet Provides Threat Intelligence Technology Cloud Based Sandboxing and IP Reputation Services

FortiGuard Labs provide enhanced protection capability for their platforms while launching new, cloud-based sandboxing and IP reputation services to help stop advanced persistent threats (APTs).

First Ponemon Study on Big Data Analytics in Cyber Defense is a National Wake Up Call

First Ponemon Study on Big Data Analytics in Cyber Defense is a National Wake Up Call

Cyber attacks worsen, but only one in five organizations believe they are effective at stopping them.

Whitby School Appoints Emergency Response Expert

Whitby School Appoints Emergency Response Expert

Whitby School in Greenwich, Conn. has appointed 911 Consulting LLC as its emergency preparedness consultant.

Fluidmesh Announces New Staff Members

Fluidmesh Announces New Staff Members

Fluidmesh Networks welcomes Andre Duncan and Tom Goodman to the company.

HID Global Adds pivCLASS Credentials to Government Solutions

HID Global Adds pivCLASS Credentials to Government Solutions

Article Highlights: Company’s new, dual-interface smart cards for FIPS-201 physical and logical access control deployments are also on the GSA-approved product list. Credential is available as a traditional PIV-I credential for government use or as a CIV credential for a wide variety of current and emerging commercial applications.

ASSA BLOY and HID Global Will Showcase Solutions at Mobile World Congress 2013

ASSA BLOY and HID Global Will Showcase Solutions at Mobile World Congress 2013

Article Highlights: HID Global will showcase the Seos ecosystem with parent company ASSA ABLOY and its group companies’ solutions in Pod #1 in the NFC Experience Center. ASSA ABLOY group company Yale Locks will be demonstrated in the GSMA Connected City. Seos digital credentials will be used with an Oberthur Technologies dragonFly NFC SIM card and ASSA ABLOY group company VingCard Elsafe locks in the Oberthur Technologies stand 6C81, Hall 6.

Online Exclusive: Video Security Evolution

Online Exclusive: Video Security Evolution

Hybrid VMS and NVR systems are quickly gaining popularity. Hybrid recording systems directly connect to existing analog cameras and allow for an easier and more cost effective transition from analog cameras to IP.

McAfee Mobile Study Documents Sophistication of Risky Apps

McAfee Mobile Study Documents Sophistication of Risky Apps

McAfee released the results of its “Mobile Security: McAfee Consumer Trends Report,” documenting sophisticated and complex, risky apps containing multi-faceted scams, black market crimes, drive-by downloads and near-field communication threats. The report identifies a new wave of techniques hackers use to steal digital identities, commit financial fraud, and invade users’ privacy on mobile devices.



Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace

Sandia National Laboratories Researcher Looks for Bad Guys in Cyberspace

The weakest link in many computer networks may just be the gullible human.

Quantum Cryptography Put to Work for Electric Grid Security

Quantum Cryptography Put to Work for Electric Grid Security

A Los Alamos National Laboratory quantum cryptography (QC) team successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”