Utilities


A Modern Threat

A Modern Threat

Whether it is water, electricity, gas, oil or even telecommunications and transportation hubs, critical infrastructure facilities present unique challenges for security professionals.

Protecting Utilities

Federal, state and local agencies prioritize robust physical security plans for the nation’s electric power utilities. And they should. Any disruption in service from a primary provider could impact millions of people and businesses over a wide swath of the country.

5G cell tower

New Government Strategy for 5G Security Sets Stage for Domestic Rollout

Franco Zaro of Valid breaks down new government efforts to establish a 5G security strategy and public paranoia about the wireless infrastructure.

Considerations for Infrastructure

Considerations for Infrastructure

Security is top of mind for consumers around the world and businesses across industries.

power towers

Senate Passes Bill To Explore ‘Analog’ Solutions to Securing America’s Energy Grid

If the Securing Energy Infrastructure Act is signed into law, it will create a working group tasked with isolating the energy grid from attacks using “manual procedures.”

Transforming Security

Transforming Security

Empresa Eléctrica de Guatemala (EEGSA Group) required a video surveillance system that could digitize the security footage on its substations to help avoid damage to its own infrastructure as well as electrocution hazards for people trying to access these places without warning or authorization.

Protecting Our Water Supply

Protecting Our Water Supply

Maintaining the security of our nation’s water supplies is serious business. Attacks from a lone vandal to a team of foreign terrorists could, within hours, result in widespread illness or economic disruption.

The Continuing Evolution of Power and Transmission Solutions

The Continuing Evolution of Power and Transmission Solutions

Thanks to a number of new technology advancements, power supplies and transmission solutions with network management features are a natural progression for ensuring the reliability of today’s IP-based physical security systems.



Mark Cuban to Donate $1 Million for Dallas Police Response to Orlando Shooting

Mark Cuban to Donate $1 Million for Dallas Police Response to Orlando Shooting

Dallas Mayor Mike Rawlings announced Mark Cuban will donate $1 million to the Dallas PD to help enhance counterterrorism efforts.

Advanced Power Management Solutions Creates New Revenue Opportunities

Advanced Power Management Solutions Creates New Revenue Opportunities

Managed power is an essential element in a comprehensive security solution and its continued evolution helps ensure the operational integrity of today’s integrated systems.

Cleveland Prepares for Riots at Republican Convention

Cleveland Prepares for Riots at Republican Convention

Cleveland is spending $20 million in federal money on riot and security gear for the Republican Convention.

A Look into the World of Body Armor

A Look into the World of Body Armor

Ensuring your own safety is the most important aspect of working in Security. Body armor and other forms of protective clothing are vital pieces of equipment, and all Security Operatives (SOs) should be aware of their benefits.

One Key Figure Dead in the Arrest of Oregon Protesters

One Key Figure Dead in the Arrest of Oregon Protesters

Protesters who’ve occupied a federal building in Oregon have been arrested.

Partnership Delivers Unique Video Recording and Storage Solution

New Samsung WiseNet Camera App records directly to disk.

This Year’s Hottest Gift Banned from Airlines

This Year's Hottest Gift Banned from Airlines

Nearly every major U.S. carrier won’t let you board with a hoverboard in tow.

Perfect Foresight - Making hazardous chemical safety procedures a priority

Perfect Foresight

In the weeks following the massive explosion at a warehouse owned by Ruihai International Logistics in the Chinese port of Tianjin, investigators are getting a better idea of what led to the disaster that killed 173 people—104 of whom were firefighters—and injured hundreds more.

Managing Risks - Security efforts are now defined to protect critical infrastructure

Managing Risks

Traditionally, electrical substation security was aimed only at preventing access to stop vandalism and improve safety. Today, however, security efforts have been redefined to address new threats in order to protect critical infrastructure.

STANLEY Security and I-View Announce Partnership

STANLEY Security and I-View announce their partnership for live, actionable verified alarm response system.

Sound the Alarm

Sound the Alarm

To support safety and notify personnel in the case of an emergency, Peru LNG’s needed a general alarm and mass notification system (MNS).

Trusted Resources Promote Safe, Secure Environments

Online Exclusive: Trusted Resources Promote Safe, Secure Environments

Mitigate insider threat and improve perimeter security and personnel assurance to ensure only trusted resources have access.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities