Top Stories


security operations center

Establishing IT Infrastructure Through Security Operations Centers

How to improve client and employee trust, collaborate across departments and reduce costs through SOCs

google classroom

Google Facing Lawsuit Over Collection of Facial Scans, Personal Data From Children

School districts are increasingly turning to Google for online classroom tools during the coronavirus pandemic, but the company has faced scrutiny for the data it collects on students.

baltimore aerial

Baltimore Approves Six-Month Aerial Surveillance Program To Address Violent Crime

Three private surveillance planes will take images of Baltimore neighborhoods to be used in criminal investigations, an effort that will be studied to see if it lowers the crime rate.



Genetec Announces Immediate Availability of AutoVu™ SharpZ3 Next-Generation Mobile License Plate Recognition System

Edge-based mobile ALPR brings new insight and accuracy in vehicle analytics and situational awareness

zoom building

Zoom CEO Vows To Improve Privacy, Cybersecurity Issues After User Criticisms

After experiencing an unprecedented growth in users over the course of a month, the video conferencing app is hoping to address complaints of “Zoombombing” and improper data collection.

Genetec Releases Access Control Feature to Help Identify People at Increased Risk of Contact With Contagious Individuals

“Contagion/Contaminant Proximity Report” available free of charge to any Genetec Security Center Synergis™ access control customers

Fortem Technologies Announces Shipment of New DroneHunter F700

New interchangeable countermeasure system can be customized on the fly for varied interdiction scenarios

scDataCom Launches New "SafeCity Initiative" With Partnerships with Security Manufacturers

Local security company offers free CCTV to Savannah business community

washington capitol

Washington State Adopts Legislation Regulating, Restricting Facial Recognition Use

The law, which will go into effect next year, will require law enforcement to use facial recognition software only to investigate serious crimes and issue public accountability reports.

zoom phone

Video Conferencing Software Zoom Faces Scrutiny Over Hacks, Abusive Behavior During Meetings

The spread of “Zoombombing,” or hijacking a meeting room with abusive images or speech, has grown in scope as more Americans turn to teleconferencing for classroom instruction and workplace meetings.

marriott sign

Marriott Discloses Second Security Breach, Affecting Millions, In Two Years

The hack took place through Marriott Bonvoy, the company's loyalty app, and affected up to 5.2 million guests.

spam email inbox

Research: Americans Should Watch Out For Hacking Campaigns Related to Stimulus Bill, Economic Recovery

Cyber attackers have already attempted to profit off of spam websites selling fake coronavirus cures. Now, hackers will turn toward Americans’ thirst for information about stimulus checks and financial aid.

Department of Homeland Security Plans to Use Facial Recognition to Track Transnational Gang Activity

The request for proposals for a “gang intelligence application” reflect the agency’s growing ambitions in using facial recognition and other new tech to identify and arrest criminals.

Improving Operations

Protecting assets and people has always been a top priority for Kirkland’s, a global home décor retailer. With over 400 stores in 37 states, Kirkland’s is a go-to spot for a broad selection of distinctive merchandise: art, mirrors, candles, lamps, frames, accent rugs, furniture and more

TSA ID checkpoint

DHS Delays Real ID Deadline Until 2021 Due to Coronavirus Crisis

While the extension will provide another 18 months for Americans to obtain the new driver’s licenses, some officials believe the deadline will have to be extended again.

who flag

World Health Organization Facing Cyber Attacks During Coronavirus Response

A malicious site imitating the WHO’s email system was created to collect the account information of the organization’s employees.

alarm response center

Security Industry Groups Call For Alarm Response, Security Services to Be Classified as “Essential” During Coronavirus Pandemic

SIA, ESA and TMA have penned a letter to public safety officials calling for governments to exempt alarm response centers and companies that serve them from shelter-in-place orders.

Arcules Expands Sales Leadership by Appointing New Senior Director of Sales

Bruce Nisbet joins Arcules from Hanwha Techwin America with over 30 years of experience in the industry

STANLEY Security Names Chadi Chahine as Chief Financial Officer

The news comes on the heels of the announcement of Kara Pelecky as Chief Information Officer

justice department

Justice Department Takes First Legal Action Against Coronavirus Scam Websites

A federal judge granted a temporary restraining order to have a website selling fake vaccine kits shut down immediately.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3