Airport | Aviation Security

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Thu, 2015-09-10 12:49 PM
Washington, DC, September 4 - A new Terror Threat Snapshot for the month of September was released today by House Homeland Security Committee Chairman Michael McCaul. The monthly assessment is the...
Tue, 2015-09-08 07:34 PM
Washington, DC, September 8 - The Federal Aviation Administration (FAA) today announced that it has awarded $100 million in contracts to eight companies to develop and demonstrate technologies that...
Tue, 2015-09-08 02:27 PM
Cameri Air Base, Italy, September, 7 - Italy’s first F-35A Lightning II, known as AL-1 and assembled at the Cameri Final Assembly and Check Out (FACO) facility, flew for the first time today marking...
Thu, 2015-09-03 08:38 PM
Toronto, ON, September 2 - ASIS International Canada officially announced that this year's Canada Night will take place on Sunday, September 27, 2015, at Café Tu Tu Tango Restaurant and Bar. ...
Thu, 2015-09-03 08:29 PM
Hill Air Force Base, UT, September 2 - The first two Lockheed Martin F-35A Lightning IIs assigned to the 388th Fighter Wing were officially delivered to the base today. The two F-35A Conventional...
Wed, 2015-09-02 12:09 PM
Andover, MA, September 2 - Morpho (Safran), through its subsidiary Morpho Detection, today announced a contract with Denmark’s Copenhagen Airport for 30 desktop Itemiser® 4DX explosives trace...
Tue, 2015-09-01 05:06 PM
FAA Administrator Michael Huerta first announced the initiative in May, asking for volunteers to test the app. The FAA has notified those who previously signed up and will be pushing the app to them...
Tue, 2015-09-01 04:48 PM
Securiport named Track Sponsor for IATA’s AVSEC World ConferenceWashington, DC, August 25 – A world leader in passenger biometric recognition, immigration control systems, and civil aviation security...
Fri, 2015-08-28 05:02 PM
Waltham, MA, August 28 - Boston Engineering today announced a $150,000 contract from the U.S. Air Force to enhance its UAV capabilities and to also reduce drone noise. Specifically, Boston...
Mon, 2015-08-24 08:05 PM

Click Here

Active subscribers to GSN’s every-other-month digital editions can expect to receive the 52-page page August-September Digital Edition today, while non-active readers can access this edition and sign...
Thu, 2015-08-20 05:35 PM
An F-35A fired 181 rounds from its four-barrel, 25 millimeter Gatling gun during a ground test at Edwards Air Force Base earlier this month.  The gun is embedded in the F-35A’s left wing and...
Wed, 2015-08-19 02:00 PM

Ed Hammersla, president,

Raytheon|Websense

Austin, TX, August 19 - A new survey of security executives at large companies in the U.S., commissioned by Raytheon|Websense, reveals that confidence in their enterprise security posture is lacking...

Commentary and Opinions

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.
With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.
The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
 

April 2016 Digital Edition

Click Here

March 2016 Digital Edition

Click Here

February 2016 Digital Edition

 

Click Here

January 2016 Digital Edition

 

Click Here

December 2015/January 2016 Digital Edition

 

Click Here

Digital Version of November/December 2015 Print Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Bohemia, NY, March - Data Device Corporation (DDC) introduces the new BU-67125W Compact Avionics Interface Computer (AIC-RC), offering a completely customizable, off-...

Westford, MA, December 10 – Tyco Security Products introduces the new Illustra Pro 2 megapixel 30x PTZ camera, offering a powerful 30x optical z...

Ridgefield Park, NJ, December 7 - DVTEL, which was recently acquired by FLIR, is excited to announce the next generation Ariel dome  and bullet cameras set a new standard o...

Seattle, WA, December 3 - The Port of Seattle announced the launch of the state-of-the-art runway management solution RunWize™, which includes FODetect®, automated Foreign Objec...

San Diego – CohuHD Costar is proud to introduce the first in the RISE series of high-performance video cameras - the RISE 4260HD PTZ camera.  Designed and built using the l...

White Papers

Due to the limited amount of area that standard video cameras can cover while providing a sufficient level of detail, the current model for security system design relies on the use of large numbers of cameras.