Top Stories


Department of Air Force Certification Grants Vindicator Authority to Operate Critical Asset Security on USAF Networks

Honeywell’s portfolio of Vindicator security technology, which is used to protect critical-infrastructure facilities across the globe, achieved a major milestone by being certified for use on U.S. Air Force data networks.

The Complexity of Mass Notification

The Complexity of Mass Notification

To better understand what is needed and the current state of mass notifications, Siemens undertook a detailed analysis of U.S. colleges and universities, taking a hard look at information provided to the government as part of the Clery Act. The company released the results in October in a white paper.

The Logistics of Security

The Logistics of Security

Navarre Corp., a distribution and retail support operation in Minneapolis, previously relied on an analog-based surveillance system as a way to increase security and aid in investigations, but the company found the system unreliable for capturing high-quality video when incidents occurred.



Protecting Naval Ordnance

Protecting Naval Ordnance

The Naval Ordnance Test Unit (NOTU) at the Cape Canaveral, Fla., Air Force Station supports and tests sea-based weapons in a safe environment.

Mob Mentality

Mob Mentality

’Tis the season to be jolly, especially if you’re a retailer. For most stores, the cash registers are ca-chinging more this month than they have all year.

Aviation Soars with Security

Aviation Soars With Security

This year’s EAA AirVenture 2011 in July drew close to 550,000 visitors during the seven-day event—members, fans and spectators who came to see daily aviation shows, aerobatics and pyrotechnics, as well as the opening day Fly-In Theater.

Aggressively Priced Clouds

Aggressively Priced Clouds

A lower-cost virtual infrastructure gives cloud providers pricing leeway that can be used either to beat a competitor’s price or to increase margins.

Iconic Shanghai

Iconic Shanghai

Shanghai WorldExpo Culture Center, shaped like a flying saucer—and often referred to as the “Spaceship”—is one of Shanghai’s iconic buildings.

Trends in Video Surveillance

Trends in Video Surveillance

The transition from analog CCTV equipment to network video surveillance equipment continues to be the major overarching trend within the video surveillance industry.

Outsourcing Access Control

Mike Flannery, director of commercial hardware solutions of ADT Commercial Security, discusses the three types of access controls, and how users can determine which solution is best for their business.

Study: Cyber Attackers Think Like Regular Crooks

Researchers are applying criminological concepts in the study of cybercrime.

Bear Creek Mountain Resort Ensures Guest Safety with Avigilon Surveillance System

Bear Creek Mountain Resort replaced its analog-based surveillance system with the Avigilon high-definition surveillance solution for greater reliability, enhanced image quality, and the ability to more efficiently and quickly resolve incidents onsite.

Engineers Developing Military Applications for Smartphones

Engineers from the MU College of Engineering, with funding from the U.S. Army/Leonard Wood Institute, have enhanced popular smartphones to be able to find and track targets.

Stress Response in Police Officers May Indicate Risk for PTSD

Stress-related disorders are often linked to people working in the line of fire.

Department of Homeland Security Logo

CFATS Update The Pre-Authorization and Authorization Inspections

In October 2006, the Department of Homeland Security Appropriations Act of 2007 became law. Section 550 of the Act ordered the Department of Homeland Security (DHS) to...

ICE Seized 150 Websites that were Illegally Selling, Distributing Counterfeit Merchandise

This operation is the eighth phase of Operation In Our Sites, a sustained law enforcement initiative to protect consumers by targeting counterfeit and piracy on the Internet, and the second year it has coincided with Cyber Monday.

A Holistic Approach to CFATS Compliance

Knowing the identity of workers and monitoring their access to various operations are key capabilities required to meet Chemical Facility Anti-Terrorism Standards (CFATS). Several of the Department of Homeland Security (DHS)'s 18 Risk-Based Performance Standards (RBPS), which were formulated to ensure protection of chemical facilities, specifically mention the need for comprehensive monitoring of employee identity and control of access to critical areas.

Feds Seize 9 Tons of Marijuana Near Otay Mesa Border Crossing

Seven individuals have been charged in federal court with drug smuggling following the discovery of more than 9 tons of marijuana inside a tractor trailer attempting to enter the United States at the Otay Mesa Commercial Port of Entry.

Norwegian Study Finds Opening Bars Longer Increases Violence

Small changes in pub and bar closing hours seem to affect the number of violent incidents.

Technology's Role in Achieving Chemical Security Standards

The U.S. Department of Homeland Security developed the Chemical Facility Anti-Terrorism Standards (CFATS), a comprehensive set of security regulations governing chemical facilities, to ensure companies that manufacture, store and transport chemicals are properly secured. While various technologies can play a role to protect chemical facilities, CFATS does not specify which should be used or how. Instead, CFATS specifies 18 Risk-Based Performance Standards (RBPS) to guide chemical facilities in selecting and implementing appropriate protective measures to reduce vulnerability and manage risk.

Featured

  • Cutting Retail Losses

    Retail is still a more complex and dynamic security vertical in modern society. Inherent challenges with in-store and distribution center operations are primarily due to constantly shifting consumer buying trends. Retailers must show daily flexibility to keep workers, meet sales goals and attract customers while maintaining safe and efficient operations. Retail is an intricate web of interconnected elements. Read Now

  • The Key to Wellbeing in the Office

    A few years ago, all we saw in the news was the ‘great resignation.’ Now we have another ‘great’ to deal with. According to CBRE, 2023 was the start of the ‘great return’ as office workers returned to their normal offices after working from home. The data shows that two-thirds of all U.S office buildings were more than 90% leased as of Q2 2023. Read Now

  • Failed Cybersecurity Controls Costing U.S. Businesses $30 Billion Yearly

    Panaseer recently released ControlWatch and the Continuous Controls Battle: Panaseer 2025 Security Leaders Report examining the cost of cybersecurity control failures and the impact of growing personal liability for security failings on security leaders. The report analyzes the findings of a survey of 400 security decision makers (SDMs) across the US and UK. It shows that security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps. Read Now

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3