Top News


Some Things Different, Most The Same

With this year's IFSEC exposition in the books, there are many things similar to tradeshows in the United States. IFSEC, hosted in the United Kingdom, relies heavily on local traffic. But because the show is in Birmingham, there is more outside traffic.

Poland Office Building Uses Idesco Access Control Readers

Idesco’s Access Quattro access control readers were chosen for a security system in the Rondo office building in Warsaw, Poland.

Opgal Launches EyeR-Core Video Engine Platform

Opgal Optronics Industries, a manufacturer of thermal and active-imaging solutions for security and safety applications, recently announced the launch of EyeR-Core, a new high-end thermal-imaging video engine (core) designed for handheld and portable applications.

FBI: Violent Crime Drops 5.5 Percent In 2010

According to the FBI’s Preliminary Annual Uniform Crime Report released today, the nation experienced a 5.5 percent decrease in the number of violent crimes and a 2.8 percent decline in the number of property crimes in 2010 when compared with data from 2009. The report is based on information the FBI gathered from 13,007 law enforcement agencies that submitted six to 12 comparable months of data for both 2009 and 2010.

Future Fibre Technologies To Help Protect 310 Miles Of Buried Pipeline In Iraq

Future Fibre Technologies, provider of fiber optic intrusion detection, working with their exclusive in-country agent AYA International, have recently signed a contract to protect 310 miles of buried pipeline in Iraq.

More Than 1.5 Billion Smart Credentials To Ship In Next Three Years, According To Research

Now a new wave of adoption, with upgrades to second or third generation documents, is sustaining the market. ABI Research estimates that about 1.5 billion “smart credentials” will be issued through 2014.

Research Examines Five Industries Most Susceptible To Phishing Attacks

Internet Security Awareness Training (ISAT) firm KnowBe4 has released new cybercrime statistics that identify the nation's most Phish-prone industry sectors, which are those most susceptible to cybercrime ploys. The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services.

Charlotte, N.C. Chooses Intergraph Incident Management Software

Intergraph, a provider of incident management solutions, announced recently that the City of Charlotte, N.C., has chosen Intergraph's incident management solution to enhance emergency response and interoperability between their public safety agencies.



Research: 10 Years After 9/11, Still Widespread Concerns About Terrorist Attacks

Nearly 10 years after 9/11, a majority of citizens surveyed in the U.S., Europe and Latin America report that they are "extremely" or "very" concerned about malicious or terrorist attacks on airports, airplanes, railroads, buses, subways or large gatherings of people at office buildings, sporting events or other locations, according to new research conducted by Unisys Corp.

China’s Tianjin Metro To Implement IP Video Security, Analytics

NICE Systems Ltd. recently announced that China’s Tianjin Metro will be implementing NiceVision’s IP video security solution with video analytics to enhance the safety and security of 23 stations along its Line 2 route.

Featured

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities