Airport | Aviation Security

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Mon, 2016-05-23 06:00 AM

Squaremouth

ST. PETERSBURG, FL (PRNEWSWIRE) MAY 19, 2016With speculation that terrorism is to blame, the crash of EgyptAir Flight 804 serves as another cause of uncertainty among travelers. Unfortunately for...
Thu, 2016-05-19 01:38 AM
LEXINGTON, KY (UKNOW) May 16, 2016 The University of Kentucky has received permission from the Federal Aviation Administration (FAA) to conduct research with unmanned aerial systems (UAS), or...
Thu, 2016-05-19 01:26 AM
WATERLOO, ONTARIO, CANADA and CENTENNIAL, CO (PRWEB) MAY 17, 2016Aeryon, the premier manufacturer of small unmanned aerial systems (sUAS) and Liteye Systems, a leading manufacturer and provider of...
Wed, 2016-05-18 02:15 AM
By Steve BittenbenderEditor, Government Security NewsAdd U.S. Sen. Dick Durbin to the growing Congressional chorus calling for drastic changes to the way the federal government conducts security...
Mon, 2016-05-16 12:39 AM
By Steve BittenbenderEditor, Government Security NewsThe head of the union representing the nation’s airport screeners has called on Congress to push through emergency legislation allowing the...
Wed, 2016-05-11 02:34 AM
(PRWEB) MAY 10, 2016Following on from NASA’s original idea, more than 60 organizations took part in the 1st European UTM Day in Geneva on 27 April 2016.
Mon, 2016-05-09 10:56 PM
FORT WORTH, TX (PRNEWSWIRE) MAY 9, 2016 Elbit Systems of America, LLC, through its subsidiary M7 Aerospace, LLC, was awarded a $7.5 million Firm, Fixed Price contract by the US Navy to perform...
Sat, 2016-05-07 04:19 AM
NEW ORLEANS (PRWEB) MAY 03, 2016Aeryon, the leader in small unmanned aerial systems (UAS) for commercial, public safety and military applications worldwide, today introduced AeryonLive, an integrated...
Wed, 2016-05-04 09:27 PM
BINGEN, WA (PRNEWSWIRE) MAY 4, 2016 From homeland security, to maritime search and rescue, to precision agriculture, to environmental monitoring, UAS have the potential to revolutionize business...
Wed, 2016-05-04 08:16 PM
By Steve BittenbenderEditor, Government Security NewsThe Homeland Security Secretary said in a statement Wednesday that the agency responsible for securing the nation’s airports is taking steps to...
Wed, 2016-05-04 02:41 AM
SHAKOPEE, MN (PRNEWSWIRE) APRIL 28, 2016 FAA Airman and Airspace Rules Division (Federal Aviation Administration) announces 5,076 approved Section 333 petition grants. The FAA further clarified...
Wed, 2016-05-04 02:31 AM
NEW ORLEANS (XPONENTIAL) MAY 3, 2016 The Aerodrome, the world’s first commercial droneport and teaching facility in Boulder City, NV, announced today the introduction of Part 107 courses into...

Commentary and Opinions

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.
With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.
The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
 

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

June 2016 Digital Edition

Click Here

April 2016 Digital Edition

Click Here

March 2016 Digital Edition

Click Here

February 2016 Digital Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Bohemia, NY, March - Data Device Corporation (DDC) introduces the new BU-67125W Compact Avionics Interface Computer (AIC-RC), offering a completely customizable, off-...

Westford, MA, December 10 – Tyco Security Products introduces the new Illustra Pro 2 megapixel 30x PTZ camera, offering a powerful 30x optical z...

Ridgefield Park, NJ, December 7 - DVTEL, which was recently acquired by FLIR, is excited to announce the next generation Ariel dome  and bullet cameras set a new standard o...

Seattle, WA, December 3 - The Port of Seattle announced the launch of the state-of-the-art runway management solution RunWize™, which includes FODetect®, automated Foreign Objec...

San Diego – CohuHD Costar is proud to introduce the first in the RISE series of high-performance video cameras - the RISE 4260HD PTZ camera.  Designed and built using the l...

White Papers

Due to the limited amount of area that standard video cameras can cover while providing a sufficient level of detail, the current model for security system design relies on the use of large numbers of cameras.