Category: Security Hardware and Technology

The tools of the security trade are advancing at an extraordinary pace. We take a look at the latest security hardware and software, from malware and cyberattack detection to cameras to motion sensors. These articles will help you determine what gadgets may be best for your security strategy—and what will fit your budget.

N.Y.C. Subway Agency Touts Systemwide Deployment of Security Cameras

The Metropolitan Transportation Authority (MTA) has announced that security cameras have been installed at all 472 subway stations across New York City, meaning thousands of cameras have now been deployed systemwide. The MTA says the initiative to expand security camera coverage was accelerated last year by Interim President of New York City Transit Sarah Feinberg, who identified a new class of […]

Security Breaches and the Dangers of Tailgating

A couple of years back, Boon Edam surveyed a large group of security executives to gauge their understanding of how big a risk tailgating is to their enterprise security and organization overall. The study uncovered something that shouldn’t necessarily come as a surprise to any of us, especially as the light was starting to shine […]

body camera

DOJ Launches Body-Worn Camera Program for Federal Agents

On Sept. 1, the U.S. Department of Justice (DOJ) announced the launch of the first phase of its Body-Worn Camera Program that requires department law enforcement personnel to use body-worn cameras (BWCs) during pre-planned law enforcement operations. Agents from the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) Phoenix and Detroit Field Divisions have officially begun using BWCs during these pre-planned operations. Over the course […]

How Federal Agencies Use Facial Recognition Tech

In a new report, the U.S. Government Accountability Office (GOA) examines both the current and planned uses of facial recognition technology (FTC) by two dozen federal agencies. According to the GOA, recent advancements have boosted the accuracy and use of automated FRT, making it increasingly important to understand the biometric technology’s applications across the federal […]

Global Video Surveillance Market Revenues Set to Top $24B in 2021

Global video surveillance market revenues are set to hit $24.2 billion by the end of 2021, according to Omdia’s latest Video Surveillance and Analytics Intelligence Database. The research firm says this marks a quick recovery for the video surveillance market, as demand that was suppressed in 2020 will return and revenues will be bolstered by […]

Case Study: Surveillance System Secures Houston Facilities for the Homeless

The Star of Hope Mission in Houston, Texas, has installed hundreds of Hanwha Techwin security cameras and a Wisenet WAVE video management system (VMS) to help secure facilities for unhoused men, women, and children. In this case study, Star of Hope Mission Director of Facilities Development Ike Kimmel and the security tech company discuss the […]

Security Product Roundup from ISC West 2021

Were you at the ISC West 2021 (International Security Conference & Exposition) trade show? Held July 19–21 at the Sands Expo Center in Las Vegas, the industry event had a lot to offer. As with many trade shows, there were great people for networking; insightful sessions; cool swag to grab; vital coffee setups; and, of […]

Seattle Port Authority Permanently Bans Facial Recognition

The Port of Seattle Commission has voted to permanently ban the use of biometric technology—including facial recognition—for law enforcement, security, and mass surveillance purposes by the Port and any private-sector entities operating at its facilities, including the seaport and the Seattle-Tacoma International Airport. The Security Industry Association (SIA), a vocal advocate for the responsible use […]

National Lab’s ‘Shadow Figment’ Tech Foils Cyberattacks

Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The aim is to sequester bad actors by captivating them with an attractive—but imaginary—world. The technology is aimed at protecting physical targets—infrastructure such […]

Best Practices for Data Breach Detection, Response

It’s not a matter of who will be affected by a data breach but when. The COVID-19 pandemic has awakened a Pandora’s box of data predators. For a company, the breaches can be costly, both financially and in other ways, including the devastating toll they can take on your reputation. Many breaches occur because of […]