Security Services

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Tue, 2010-05-25 01:45 PM
Smith Detection's HEXRIS
CBP has studied the environmental effects of using truck-mounted and stationary High Energy X-ray systems to inspect cargo containers at U.S. seaports and land ports of entry, and concluded that “...
Mon, 2010-05-24 03:15 PM
Common Access Card
The two councils that govern the Federal Acquisition Regulations (FARs) have proposed regulatory changes that would require federal contractors to gather up all identification documents –...
Mon, 2010-05-24 03:03 PM
Package screening system
DHS is searching for innovative ways to detect weapons, explosives and other contraband concealed inside personal items, luggage or packages, and is planning a two-week experiment this October in...
Mon, 2010-05-24 02:53 PM
Two-wire surveillance kit
The U.S. Secret Service plans to purchase at least 300 – and perhaps as many as 5,000 – two-wire surveillance kits, which can work with Motorola Saber radios, handheld portable radios that were first...
Fri, 2010-05-21 01:53 PM
Rep. Henry Johnson
In a move that would expand the legal authority of DHS at U.S. airports, Rep. Henry “Hank” Johnson (D-GA) has introduced legislation that would prohibit individuals from carrying firearms at most...
Thu, 2010-05-20 02:19 PM
The Transportation Security Administration (TSA) announced on May 19 that it has awarded its Information Technology Infrastructure Program (ITIP) contract to Computer Sciences Corporation (CSC), of...
Thu, 2010-05-20 02:04 PM
The Federal Communication Commission (FCC) has empowered the chief of its Public Safety and Homeland Security Bureau to establish advisory bodies – and select the appropriate members of those bodies...
Wed, 2010-05-19 09:53 AM
HALO Corp., a San Diego-based organization founded by former special operations, national security and intelligence personnel, has scheduled two Counter-Terrorism Summits, one to take place on June 7...
Sun, 2010-05-16 11:20 AM
What special search techniques, housing procedures, mental health issues and privacy concerns should be taken into account in the management of lesbian, gay, bisexual, transgender and intersex...
Sun, 2010-05-16 10:42 AM
Boston's Logan Airport
In an effort to improve its services for travelers arriving at U.S. airports from overseas, Customs and Border Protection plans to ask about 21,000 arriving passengers each year – at the 20 busiest...
Fri, 2010-05-14 03:14 PM
Confiscated cell phones
The National Telecommunications and Information Administration (NTIA) is considering three different technology-related approaches to preventing inmates in federal prisons from secretly making cell...
Fri, 2010-05-14 03:03 PM
Ronald Reagan Bldg.
A solicitation by Customs and Border Protection to upgrade what it described as “outdated technology” and “obsolete equipment” in the existing CCTV system at its offices in the Ronald Reagan Building...

Commentary and Opinions

Rolling Meadows, IL, October 14 - Is the Internet of Things safe? A new survey from global cyber security association ISACA suggests a major confidence gap about the security of connected devices between the average consumer and cyber security and information technology professionals.
Washington, DC, September 11 - Today, the nation marks the 14th anniversary of the 9/11 terrorist attacks that took the lives of some 3,000 Americans. In the 14 years that have passed, the world has become an even more dangerous place, while in many ways our defenses against another major terrorist attack have been weakened, warns the Federation for American Immigration Reform (FAIR).
By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
 

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Quanergy Systems, Inc., the leading provider of LiDAR sensors and smart sensing solutions, introduced Q-Guard, a complete LiDAR-based security system...

Austin, TX, December 21 - Eagle Eye Networks™, Inc. and SureView Systems announced today an integration of the Eagle Eye Security Camera Video Management System (VMS)...

Sarnia, ON, December 16 - A research collaboration between Lambton College's Bluewater Technology Access Centre (BTAC) and Lamperd Less Lethal, Inc. has led to the su...

Westford, MA, December 17 - Tyco Security Products introduces the integration of IdentyTech™ fingerprint readers with Software House’s C•CURE 9000 security and event management...