Top Stories


Unique Hiring Demands

Unique Hiring Demands

Mitigating risks and threats along with extensive intelligence analysis are at the core of comprehensive and effective customized executive protection programs.

Keeping Your Eye on the Ball

Potential security threats keep evolving. It’s a distressing reality that we continually need to adapt to—one that particularly weighs heavily on the minds of stakeholders at major sports venues as they explore security solutions to prevent drone, vehicular and other dangerous assaults.

The Case for Access Control

Security experts agree that the three most important components of a physical security plan are access control, surveillance and security testing, which work together to make a space more secure.



Landmark Security

How do you secure the largest cathedral in the world when it sits on 11.3 acres, is considered a New York City landmark, and is a busy destination for worship, cultural arts, social services and tourism?

Discussing Security

The proliferation of smart edge devices that aggregate data and interoperate with other devices and systems on the network, is also fueling this migration by delivering additional sources of data that can help to streamline workflows, build efficiencies and save costs along with numerous other benefits.

Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

IBM Security recently released the annual Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations.

A Business Owner’s Demand

A Business Owner’s Demand

Business owners are making the move to higher resolution cameras at a pace that defies the influences of the pandemic, supply chain challenges, and labor shortage, according to a new 2022 worldwide security camera report.

Expanding Safety-Sensitive Roles to Address Cyberattacks

The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners.

The Key to Preventing Production Network Attacks Is to Start Looking Within

The business of cybercrime is rapidly increasing in scope and scale. The cost incurred by companies due to data breaches increased by nearly 10 percent from 2020 to 2021, meaning if the cost incurred by attacks was measured against the GDPs of all the nations of the world, it would be third largest, just lagging behind the U.S. and China.

Protecting the Infrastructure

Protecting the Infrastructure

Critical infrastructure facilities can be quite large, so protecting them is a complex challenge that demands multifaceted solutions. Robust, cybersecure technology solutions exist to protect facilities of all sizes and types but getting the most out of these solutions requires attention to the human element as well.

The Ongoing Value of VSaaS

The Ongoing Value of VSaaS

Subscription-based service models are increasing in the security industry. Shifting to video subscription as a service (VSaaS) or SaaS in general involves changing the mindset that one is receiving a service rather than a product. What end users want is a system that is always current rather than a product that can quickly become out of date or is not functional when it matters most.

Adding Audio to ROI Programs

Adding Audio to ROI Programs

Across the globe, security teams are under pressure to justify what they do and how they do it. They need to continually make a strong case to internal and external shareholders for their budgets and activities.

Place Your Bets

Place Your Bets

For a casino, constant threats of theft, hacking, and fraud from guests and employees are simply table stakes. The combination of high-volume visitor traffic and significant amounts of cash can create potential security nightmares, with the cards often stacked against the house.

Woman Shot and Injured After Firing Gun At Dallas Love Field Airport

An armed woman fired several shots at the ceiling at Dallas Love Field on Monday morning before being injured by a police officer.

Playing the "A" Game

Playing the "A" Game

The cardboard fans are gone and the real fans are back, making up for lost time. They are packing stadiums, the bars and restaurants surrounding them. They’re not just going to the games. Sports venues have stretched beyond the stadium proper to incorporate pavilions and entertainment complexes, owned and managed by the franchises that feature retail, hotels, theaters and much more.

Securitas Acquisition of STANLEY Security and Healthcare Now Complete

The highly anticipated acquisition of STANLEY Security and Healthcare accelerates Securitas’ transformation journey toward technology-based solutions and its ambition to position itself as an outstanding global security and safety partner that helps make the world a safer place.

Big Solutions, Small Projects

Big Solutions, Small Projects

A lot of buzz in the security industry revolves around the explosion of the global datasphere. Especially as the COVID-19 pandemic has forced many industries to transition from in-house operations to work-from-home—if not entirely digital—formats, global data creation, consumption and circulation has skyrocketed.

Specialized Window Locks Safely Provide Clean, Ventilated Air are an Absolute Must

3-D Lockdown Supply has collaborated with Remsafe Window Locks to provide an extensive range of custodial-keyed window limiters that increase window security without compromising on ventilation for health and safety.

Bailey’s Gift Honors Kentucky High School Shooting Victim

Bailey’s Gift Honors Kentucky High School Shooting Victim

With each campus, or mass shooting for that matter, Secret Holt feels the pain of the day her daughter, Bailey, was shot and killed at Marshal County High School in rural Kentucky. That tragedy was more than four years ago, and nerves are still raw.

Study: Communities Find Success with Model Alarm Ordinance

Study: Communities Find Success with Model Alarm Ordinance

A new study by a professor at the UNC-Charlotte, Criminal Justice & Criminology Department shows that most electronic security systems in the communities studied protect life and property without generating calls for police services.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3