Top Stories


Monitronics Receives 4th Consecutive Consumer's Choice Award

Award based on customer service reviews and recommendations among alarm system companies.

BDCVideo's Orion Series for OnSSI

Partnership provides complete software and hardware appliance for security integrators.

LPR

ALPR Catches Virginia Shooter Fast, Public Takes Notice

Despite all the unknowns in this case, we do have one solid and incontrovertible fact: Flanagan was apprehended very quickly by Virginia State Police. The reason is because he was detected by an Automatic License Plate Recognition (ALPR) system.



ASIS International to Honor Military, Law Enforcement, & Emergency Medical Technicians at ASIS 2015

Complimentary one-day admission, Wednesday, September 30th.

A Text Message of Apology before Killing

A Text Message of Apology before Killing

Teenager texts apology to the parents of the students he was about to kill.

Top Baby Monitors Lack Basic Security Features

Top Baby Monitors Lack Basic Security Features

A new report says some of the top baby monitors are vulnerable to basic hacking attempts.

Yay or Nay for a U.S. Border Wall

Yay or Nay for a U.S. Border Wall

A brief history of unsuccessful attempts in light of current presidential debates between candidates.

PGE Fined for Security Breakdown

PG&E Fined for Security Breakdown

Pacific Gas & Electric has been fined $50,000 for an incident that occurred at its San Jose substation.

Proper Use

No one can argue that IP video surveillance cameras surpass their analog predecessors thanks to the higher resolution and vastly improved quality images.

The Best First Response

The Best First Response

The continuing threat posed by global terrorism has driven huge amounts of government investment into electronic surveillance, as well as both wide and targeted physical monitoring systems in our cities.

Who Does Your Engineering?

Security systems today are getting more sophisticated to some, and less to others.

Reducing opportunity for catastrophic compromised data

Securing Your Cloud

Cloud computing offers numerous benefits, such as powerful processing capabilities, improved access, higher availability and significant savings with on-demand hosting.

Meeting the challenging security needs of parking facilities

Parking Spaces

Parking facilities—both outdoor lots and structures—represent a significant security challenge. Most facilities are easily accessible to the public.

Secure Hosted Technology

Secure Hosted Technology

From data breaches to security system compromises, there’s a ‘cloud’ hanging over hosted environments, labeling them unsafe or subject to easy compromise.

Key Control Central

Airports have many security requirements and challenges, and part of the challenge arises because of the mix of people on-site, including airport staff, airline staff, contractor and vendor staff and travelers.

Back to Work

Phil Lake doesn’t have to work. He retired only to find himself back behind the desk running an integration company in Austin, Texas. His retirement, I guess, is working some more.

Knowing Your Access Control

Knowing Your Access Control

With four or more access points around your property, there is no way that you can keep eyes at all entry points, especially if all can’t be viewed from a single location.

Private and Secure

Private and Secure

The management needed to make sure the residents in their care were safe and secure in their rooms and within the facility itself. With an on-site pharmacy, securing and monitoring certain areas was also a priority.

Security Begins at Home

The majority of our editorial efforts focus on commercial and industrial security.

Boosting Response Time

It was important that all EMT workers wore the proper identification to help keep them safe and secure on the job, and allow hospitals and other facilities to recognize them quickly.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3