Airport | Aviation Security

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Tue, 2016-04-19 11:47 PM
By Steve BittenbenderBy a 95-3 vote, the Senate on Tuesday passed the Federal Aviation Administration’s Reauthorization bill and with it, included several items that take aim at making the skies...
Thu, 2016-04-14 08:59 PM
ARLINGTON, VA (PRWEB) APRIL 13, 2016 - Blackstone Technology Group (Blackstone), in partnership with the Department of Homeland Security (DHS), is proud to announce that Carwash has received the DHS...
Wed, 2016-04-13 02:51 AM
SAN BERNARDINO, CA (PRWEB) APRIL 07, 2016 - Acoustiblok was recently contacted on an outdoor noise problem at the San Bernardino Airport in San Bernardino, California. A large section of the airport...
Wed, 2016-04-13 01:42 AM

Photo courtesy of @SenatorBoxer

By Steve BittenbenderAs the U.S. Senate prepares to consider the reauthorization bill for the Federal Aviation Administration, two Senators are pushing to include legislation that require cargo...
Thu, 2016-04-07 11:38 PM
TORONTO, April 6, 2016 /PRNewswire/ - In the wake of the March 22 Brussels attacks, the latest terrorist event to strike Europe, Ingle International is highlighting the importance of the duty of care...
Wed, 2016-04-06 09:19 AM
Nobody likes a long wait after a long flightAutomation is transforming the travel experience, and nowhere is this more evident than at international borders. Over the past decade, e-passports,...
Tue, 2016-04-05 11:53 PM
PORTLAND – Residents of Portland and Southwest Washington will be able to apply to the Transportation Security Administration’s popular TSA Pre✓® application program ins
Fri, 2016-04-01 07:13 PM
Government Security News is very pleased to announce that HID Global, the worldwide trusted provider of secure identity solutions, has agreed to serve as Lead Sponsor of the GSN 2016 Airport, Seaport...
Tue, 2016-03-29 07:01 PM
By Steve Bittenbender Late last week, the Federal Aviation Administration released updated figures on Friday indicating that the number of drone reports continues to increase. Based on the last two...
Tue, 2016-03-29 06:54 PM
By Steve Bittenbender A middle-aged man was arrested in Cyprus Tuesday after he hijacked an EgyptAir plane and forced its diversion to the Mediterranean island. However, the incident did not appear...
Tue, 2016-03-22 09:30 PM
By Steve Bittenbender A pair of researchers from George Mason University have produced a study that claims the threat unmanned aircraft pose on piloted plane may be lower than anticipated. To come up...
Tue, 2016-03-22 09:19 PM

Anthony Roman, terror expert 

By Steve Bittenbender The international airport and a subway station in Belgium’s capital were the targets of terrorists, whose attacks on those facilities Tuesday morning have killed at least 30...

Commentary and Opinions

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.
With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.
The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
 

July 2016 Digital Edition

 

Click Here

June 2016 Digital Edition

 

Click Here

April 2016 Digital Edition

Click Here

March 2016 Digital Edition

Click Here

February 2016 Digital Edition

 

Click Here

January 2016 Digital Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Bohemia, NY, March - Data Device Corporation (DDC) introduces the new BU-67125W Compact Avionics Interface Computer (AIC-RC), offering a completely customizable, off-...

Westford, MA, December 10 – Tyco Security Products introduces the new Illustra Pro 2 megapixel 30x PTZ camera, offering a powerful 30x optical z...

Ridgefield Park, NJ, December 7 - DVTEL, which was recently acquired by FLIR, is excited to announce the next generation Ariel dome  and bullet cameras set a new standard o...

Seattle, WA, December 3 - The Port of Seattle announced the launch of the state-of-the-art runway management solution RunWize™, which includes FODetect®, automated Foreign Objec...

San Diego – CohuHD Costar is proud to introduce the first in the RISE series of high-performance video cameras - the RISE 4260HD PTZ camera.  Designed and built using the l...

White Papers

Due to the limited amount of area that standard video cameras can cover while providing a sufficient level of detail, the current model for security system design relies on the use of large numbers of cameras.