Top Stories


Public Wi-Fi Users Neglect Security Precautions

Public Wi-Fi Users Neglect Security Precautions

Some public Wi-Fi hotspots are provided by con artists.

DHS Issues Warning about Hobbyist Drones

DHS Issues Warning about Hobbyist Drones

Recreational drones could be used by adversaries to attack the United States.

Part 7: Refocus on the Glide Path

Part 7: Refocus on the Glide Path

Intersecting business into the professionalization of information security debate.



Senator and Comedian Team Up for Gun Control

Senator and Comedian Team Up for Gun Control

Gun violence became a personal issue due to Lafayette, Louisiana movie theater shooting on July 23, 2015 during the movie Trainwreck.

Zscaler Raises $100M in Funding

Zscaler Raises 100M in Funding

The funding was led by TPG Growth.

Part 6: Taking Control of the Stick

Part 6: Taking Control of the Stick

5 steps to help professionalize the cybersecurity workforce.

Navigating the High Seas

Navigating the High Seas

In recent years, the cruise industry has received a lot of attention from the news media regarding serious security issues onboard its vessels, ranging from people falling overboard to sexual assaults.

Everyone Is At Risk

Technology is amazing stuff. However, some of the greatest threats that today’s businessman or woman faces is a cyberattack. Just count the number of breaches in the last couple of years; you know what I mean.

Shifting the Selling Paradigm

Shifting the Selling Paradigm

With the increased focus on home automation and associated “smart home” devices, it is incumbent on security dealers, installers and integrators to do more than simply sell security products.

Access Control in the Midst of an IP Revolution

Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.

One Innovation at a Time

One Innovation at a Time

Today, Dedicated Micros continues to conceptualize and develop ground breaking video surveillance solutions to meet industry needs.

Ensuring Success

Ensuring Success

Those words are often associated with the real estate industry, but the security community can also apply that mantra to the all-important issue of camera placement for optimizing analytics.

The Big House

The Big House

A large corrections campus encompassing more than 30 buildings in the southeast United States houses approximately 5,000 inmates with separate jail facilities for men and women who are awaiting sentencing, serving sentenced jail time and are in maximum security.

The User Experience

The User Experience

With the move to a mobile- and cloud-first world, corporate data has become increasingly difficult to protect.

No Protection From Bad Data

No Protection From Bad Data

Walking the expo floor at the most recent RSA conference, it was hard to miss how many companies were talking about big data.

Security in the Sanctuary

Security in the Sanctuary

I wouldn’t consider myself an extremely religious man, but I do go to church on a weekly basis, and I do expect my presence in the church to be safe and secure.

High Value Assets

High Value Assets

Perimeter security: Just the words conjure-up visions of horror.

A Key Role

A Key Role

The city of Calgary in southern Alberta, Canada has achieved international acclaim with its annual Calgary Stampede and its legacy of world-class sporting facilities and events.

Breaching the Network

Breaching the Network

Cyberattacks are one of the greatest threats facing global businesses today.

Privileged Identities

Privileged Identities

Over the last year, we have witnessed a series of staggering data breaches affecting some of the world’s leading businesses— with each breach seemingly worse than the last in terms of financial and reputational damage.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3