Airport | Aviation Security

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Tue, 2015-10-27 09:20 AM

Bruce Blythe

AlliedBarton Security Services, www.alliedbarton.com, the  industry’s premier provider of highly trained security personnel, will host a free seminar on Workplace Violence: Layoffs, Terminations...
Fri, 2015-10-23 08:03 PM
Dubai, United Arab Emirates, and Waldwick, NJ, October 21 - Looking to capitalize on regional economic growth, rapid modernization, heightened defense and security requirements and the growing...
Thu, 2015-10-22 10:27 AM

Jeh Johnson, DHS

Washington, DC, October 8 - “Chairman Johnson, Senator Carper, and members of the Committee, thank you for the opportunity to be here. I welcome the opportunity to appear before you with Directors...
Wed, 2015-10-21 10:49 AM

Gen. Carlisle, commander of Air Combat Command

Hill Air Force Base, UT, - Base officials and the Top of Utah community officially welcomed the F-35 Lightning II at a ceremony here Oct. 14, an event that formally marked the beginning of F-35...
Wed, 2015-10-14 11:12 PM

2010 Keynote Speaker: Ret. 4-Star General Barry McCaffrey

GSN announced today that in response to a number of requests to stretch the closing date for entries in its 2015 Homeland Security Awards Program, the deadline has been extended to Friday, October 23...
Sat, 2015-10-10 01:26 PM
Vandenberg Air Force Base, CA, October 8 - A United Launch Alliance (ULA) Atlas V rocket carrying a payload for the National Reconnaissance Office (NRO) and 13 CubeSats lifted off from Space Launch...
Thu, 2015-10-08 06:49 PM
By Steve Bittenbender Denver International Airport last week announced it has created a working group consisting of local, state and national officials to proactively address concerns regarding the...
Tue, 2015-10-06 08:10 PM
By Steve Bittenbender The Federal Aviation Administration announced Tuesday it has proposed a $1.9 million fine against a Chicago-based aerial photography company it claims repeatedly used unmanned...
Tue, 2015-10-06 01:21 PM
September 29 - Peter Neffenger, incoming Administrator of the Transportation Security Administration (TSA), has submitted written testimony to the Senate concerning efforts to respond to criticisms...
Wed, 2015-09-30 02:49 AM

Sandie Davies, IFPO

By Steve Bittenbender Four women were honored at this week’s ASIS International 61st Annual Seminar in Anaheim, CA for their contributions to growth of women the security industry.
Tue, 2015-09-22 02:45 PM
Washington, DC – U.S. Transportation Secretary Anthony Foxx recently awarded $24.5 million in Federal Aviation Administration (FAA) grants to 11 airports around the country to reduce emissions and...
Tue, 2015-09-22 02:29 PM
The Federal Aviation Administration (FAA) is extending the public comment period for the Draft Environmental Assessment (EA) of the Southern California Metroplex project by an additional 30 days. The...

Commentary and Opinions

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.
With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.
The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
 

April 2016 Digital Edition

Click Here

March 2016 Digital Edition

Click Here

February 2016 Digital Edition

 

Click Here

January 2016 Digital Edition

 

Click Here

December 2015/January 2016 Digital Edition

 

Click Here

Digital Version of November/December 2015 Print Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Bohemia, NY, March - Data Device Corporation (DDC) introduces the new BU-67125W Compact Avionics Interface Computer (AIC-RC), offering a completely customizable, off-...

Westford, MA, December 10 – Tyco Security Products introduces the new Illustra Pro 2 megapixel 30x PTZ camera, offering a powerful 30x optical z...

Ridgefield Park, NJ, December 7 - DVTEL, which was recently acquired by FLIR, is excited to announce the next generation Ariel dome  and bullet cameras set a new standard o...

Seattle, WA, December 3 - The Port of Seattle announced the launch of the state-of-the-art runway management solution RunWize™, which includes FODetect®, automated Foreign Objec...

San Diego – CohuHD Costar is proud to introduce the first in the RISE series of high-performance video cameras - the RISE 4260HD PTZ camera.  Designed and built using the l...

White Papers

Due to the limited amount of area that standard video cameras can cover while providing a sufficient level of detail, the current model for security system design relies on the use of large numbers of cameras.