Top Stories


Securing the State of the Union Address

Securing the State of the Union Address

Several agencies work together to create a comprehensive security plan to protect the State of the Union.

Airbus Suffers Hack Attack, Discloses Breach

Airbus Suffers Hack Attack, Discloses Breach

Airbus has disclosed the company is the victim of a cyberattack.

San Francisco Looking to Ban Facial Recognition Tech

San Francisco Looking to Ban Facial Recognition Tech

A proposed ban in San Francisco has introduced a series of rules that could dramatically limit enhanced surveillance.



Connecticut City Looks to Use Retired Detectives as Security for Apartments

Connecticut City Looks to Use Retired Detectives as Security for Apartments

Problems at a downtown apartment building leads to discussions on hiring retired officers to keep the peace.

Advancing on Two Fronts

The way that smart cards are issued has changed dramatically in the last several years with the advent of cloud-based systems that enable the entire process to be managed and executed remotely, and with printer/encoder breakthroughs that significantly boost throughput, reliability and energy efficiency.

A Profile in Partnership

A Profile in Partnership

Microwave sensors, also known as Radar, RF or Doppler sensors, detect walking, running or crawling human targets in outdoor environments.

Cabling our Government

Cabling our Government

The government commands a lot of information in data centers, local municipalities, homeland security, health, and every touch that governments have with private citizens and companies. The data can be classified, private and public-facing as in forms.

Unlocking the Benefits

Unlocking the Benefits

The Internet of Things (IoT) promises greater connectivity, which, when properly leveraged, can provide invaluable insight into our organizations and our operational environments. In the security sector, increased connectivity between sensors and systems gives us access to more data than we thought possible even just a few years ago.

High Profile Security

As with any high-profile entertainment complex that draws more than one million visitors every year, the stadium faces complex and constantly evolving security challenges.

Deploying a Cloud Strategy

Deploying a Cloud Strategy

There’s enormous opportunity for all enterprises in the cloud, and those in the middle market are taking note.

The Next Wave

The Next Wave

Originally designed as consumer devices, smartphones have become vital elements of both our personal and professional lives. Unfortunately, as sources and repositories of our most sensitive data, smartphones have quickly become a primary attack surface for hackers, cybercriminals and foreign spies.

Crimes on Campus

Crimes on Campus

College and university campuses aren’t immune from the same types of crime, such as burglary and assault, found in any small city where thousands of people live and work closely together. Yet overall, campuses remain a mostly safe place for young adults to learn and mature.

Defending Against Attack

When Paramount Studios, the longest operating and only remaining studio in Hollywood, wanted a preventative solution that would protect tourists and talent from car attacks, they contacted Perimeter Security Group, an integrator that has become one of the leading providers of perimeter security systems in the country.

The Long Reach of Government Security

The government has its fingers in everything, and it is necessary when you think about managing the nation’s infrastructure. Think carefully about securing the nation’s transportation system.

Church Should Be Off Limits

While attending religious services during the holiday season, a local congregant asked me if I had heard about the ISIS threat to local houses of worship in East Texas. I was not aware, but I started digging.

A Slam Dunk

A Slam Dunk

With all this plus four lobbies and multiple entry points, security at American Airlines Center is a 24/7 responsibility. Finding the right camera system for such a diverse environment presented a challenge.

Introducing Kessel Run to DOD

Everyone wants a piece of Kessel Run, the Air Force’s agile software development program, and attempts to replicate its success of are already underway.

Adding Sound and Safety

Adding Sound and Safety

At JFK Airport, immigration officers process hundreds of international passengers per flight. With the continual influx of people combined with limited staffing, law enforcement personnel are increasingly looking for technologies to enhance their efforts to deter illegal entry or trafficking and aid in crime investigation.

More Than a Set of Eyes

More Than a Set of Eyes

The technology behind today’s optical sensors and lenses has come a long way in trying to mimic some of the hallmark characteristics of the human visual system.

Japan to Check 200 Million Devices for Cybersecurity Risks

Japan to Check 200 Million Devices for Cybersecurity Risks

As part of the preparations for next year’s summer Olympics in Tokyo, Japan’s National Institute of Information and Communications Technology will check about 200 million internet-connected devices for potential cybersecurity vulnerabilities.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3