Top Stories


Department of Air Force Certification Grants Vindicator Authority to Operate Critical Asset Security on USAF Networks

Honeywell’s portfolio of Vindicator security technology, which is used to protect critical-infrastructure facilities across the globe, achieved a major milestone by being certified for use on U.S. Air Force data networks.

The Complexity of Mass Notification

The Complexity of Mass Notification

To better understand what is needed and the current state of mass notifications, Siemens undertook a detailed analysis of U.S. colleges and universities, taking a hard look at information provided to the government as part of the Clery Act. The company released the results in October in a white paper.

The Logistics of Security

The Logistics of Security

Navarre Corp., a distribution and retail support operation in Minneapolis, previously relied on an analog-based surveillance system as a way to increase security and aid in investigations, but the company found the system unreliable for capturing high-quality video when incidents occurred.



Protecting Naval Ordnance

Protecting Naval Ordnance

The Naval Ordnance Test Unit (NOTU) at the Cape Canaveral, Fla., Air Force Station supports and tests sea-based weapons in a safe environment.

Mob Mentality

Mob Mentality

’Tis the season to be jolly, especially if you’re a retailer. For most stores, the cash registers are ca-chinging more this month than they have all year.

Aviation Soars with Security

Aviation Soars With Security

This year’s EAA AirVenture 2011 in July drew close to 550,000 visitors during the seven-day event—members, fans and spectators who came to see daily aviation shows, aerobatics and pyrotechnics, as well as the opening day Fly-In Theater.

Aggressively Priced Clouds

Aggressively Priced Clouds

A lower-cost virtual infrastructure gives cloud providers pricing leeway that can be used either to beat a competitor’s price or to increase margins.

Iconic Shanghai

Iconic Shanghai

Shanghai WorldExpo Culture Center, shaped like a flying saucer—and often referred to as the “Spaceship”—is one of Shanghai’s iconic buildings.

Trends in Video Surveillance

Trends in Video Surveillance

The transition from analog CCTV equipment to network video surveillance equipment continues to be the major overarching trend within the video surveillance industry.

Outsourcing Access Control

Mike Flannery, director of commercial hardware solutions of ADT Commercial Security, discusses the three types of access controls, and how users can determine which solution is best for their business.

Study: Cyber Attackers Think Like Regular Crooks

Researchers are applying criminological concepts in the study of cybercrime.

Bear Creek Mountain Resort Ensures Guest Safety with Avigilon Surveillance System

Bear Creek Mountain Resort replaced its analog-based surveillance system with the Avigilon high-definition surveillance solution for greater reliability, enhanced image quality, and the ability to more efficiently and quickly resolve incidents onsite.

Engineers Developing Military Applications for Smartphones

Engineers from the MU College of Engineering, with funding from the U.S. Army/Leonard Wood Institute, have enhanced popular smartphones to be able to find and track targets.

Stress Response in Police Officers May Indicate Risk for PTSD

Stress-related disorders are often linked to people working in the line of fire.

Department of Homeland Security Logo

CFATS Update The Pre-Authorization and Authorization Inspections

In October 2006, the Department of Homeland Security Appropriations Act of 2007 became law. Section 550 of the Act ordered the Department of Homeland Security (DHS) to...

ICE Seized 150 Websites that were Illegally Selling, Distributing Counterfeit Merchandise

This operation is the eighth phase of Operation In Our Sites, a sustained law enforcement initiative to protect consumers by targeting counterfeit and piracy on the Internet, and the second year it has coincided with Cyber Monday.

A Holistic Approach to CFATS Compliance

Knowing the identity of workers and monitoring their access to various operations are key capabilities required to meet Chemical Facility Anti-Terrorism Standards (CFATS). Several of the Department of Homeland Security (DHS)'s 18 Risk-Based Performance Standards (RBPS), which were formulated to ensure protection of chemical facilities, specifically mention the need for comprehensive monitoring of employee identity and control of access to critical areas.

Feds Seize 9 Tons of Marijuana Near Otay Mesa Border Crossing

Seven individuals have been charged in federal court with drug smuggling following the discovery of more than 9 tons of marijuana inside a tractor trailer attempting to enter the United States at the Otay Mesa Commercial Port of Entry.

Norwegian Study Finds Opening Bars Longer Increases Violence

Small changes in pub and bar closing hours seem to affect the number of violent incidents.

Technology's Role in Achieving Chemical Security Standards

The U.S. Department of Homeland Security developed the Chemical Facility Anti-Terrorism Standards (CFATS), a comprehensive set of security regulations governing chemical facilities, to ensure companies that manufacture, store and transport chemicals are properly secured. While various technologies can play a role to protect chemical facilities, CFATS does not specify which should be used or how. Instead, CFATS specifies 18 Risk-Based Performance Standards (RBPS) to guide chemical facilities in selecting and implementing appropriate protective measures to reduce vulnerability and manage risk.

Featured

  • Cutting Retail Losses

    Retail is still a more complex and dynamic security vertical in modern society. Inherent challenges with in-store and distribution center operations are primarily due to constantly shifting consumer buying trends. Retailers must show daily flexibility to keep workers, meet sales goals and attract customers while maintaining safe and efficient operations. Retail is an intricate web of interconnected elements. Read Now

  • The Key to Wellbeing in the Office

    A few years ago, all we saw in the news was the ‘great resignation.’ Now we have another ‘great’ to deal with. According to CBRE, 2023 was the start of the ‘great return’ as office workers returned to their normal offices after working from home. The data shows that two-thirds of all U.S office buildings were more than 90% leased as of Q2 2023. Read Now

  • Failed Cybersecurity Controls Costing U.S. Businesses $30 Billion Yearly

    Panaseer recently released ControlWatch and the Continuous Controls Battle: Panaseer 2025 Security Leaders Report examining the cost of cybersecurity control failures and the impact of growing personal liability for security failings on security leaders. The report analyzes the findings of a survey of 400 security decision makers (SDMs) across the US and UK. It shows that security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps. Read Now

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3