State | Local Security

Featured Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.

News

Tue, 2016-11-08 10:56 AM

Hyman

WEST CALDWELL, NJ Nov. 7, 2016 Community Education Centers, Inc. (CEC) announced today the award of a contract for operation and management of the Reagan County Jail located in Big Lake, Texas. The...
Fri, 2016-11-04 08:33 AM
By James Scott, Sr. Fellow, ICIT and Drew Spaniel, Fellow, ICIT‘Clunky as Heck’ and Security via Obscurity Create Only an Illusion of Secure Elections“Election Officials, consider your voting...
Fri, 2016-11-04 08:21 AM
Louisville Metro Government began late last month installing locally created, low-cost wireless smoke detectors in vacant and abandoned properties, in an innovative way to reduce fire risk.The city’s...
Fri, 2016-11-04 07:11 AM
Nov. 3, 2016 Colonial Pipeline Company issued the following update on the projected restart date of Line 1, which remains shut down following the event in Shelby County, Alabama.Colonial’s team on-...
Thu, 2016-11-03 06:20 AM
CHANDLER, AZ Nov. 1, 2016 Group Mobile, a rapidly expanding and growing premiere provider of innovative, full service mobile technology solutions, extends its product offerings to include the next...
Wed, 2016-11-02 12:02 AM

Bjorkdahl

SAN RAMON, CA Oct. 31, 2016 ONVIF®, the leading global standardization initiative for IP-based physical security products, announced today thatit will participate in Secured Cities 2016, an...
Tue, 2016-11-01 06:58 AM
By Steve BittenbenderEditor, Government Security NewsOne of the nation’s largest regional transit systems found itself shifting to an alternative service plan at the beginning of Tuesday morning,...
Mon, 2016-10-17 01:06 AM
Oct. 13, 2016 Aeryon Labs Inc., the leader in small unmanned aerial systems (sUAS) for military, public safety and commercial applications worldwide, today announced the successful deployment of...
Wed, 2016-10-12 01:36 AM

Washington

Sept. 22, 2016 As part of its strategy on enhancing security and rider experience on the transit system, the Los Angeles County Metropolitan Transportation Authority (Metro) Board of Directors today...
Tue, 2016-10-11 01:07 AM
By Steve BittenbenderEditor, Government Security NewsThe remnants of Hurricane Matthew may be out over the Atlantic Ocean and away from the southeastern United States, but that does not mean the...
Tue, 2016-10-11 12:27 AM

Parrish

PHOENIX, Oct. 10, 2016 Fire, security, and life safety services provider Telgian Corporation today announced that Vice President of Integrated Systems Tom Parrish, SET, CFPS, PSP, will present on the...
Wed, 2016-10-05 08:29 PM

Burak

DALLAS, Oct. 5, 2016 Greyhound today announced it will temporarily suspend service beginning at noon EDT on Thursday, Oct. 6, along major routes in Florida, including Orlando to Miami, Miami to Fort...

Commentary and Opinions

In a letter addressed to Dr. Margaret Chan, director general of the World Health Organization (WHO), AIDS Healthcare Foundation (AHF), the largest AIDS nonprofit organization in the U.S.
As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.
With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.
The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
 

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Sarnia, ON, December 16 - A research collaboration between Lambton College's Bluewater Technology Access Centre (BTAC) and Lamperd Less Lethal, Inc. has led to the su...

Westford, MA, December 17 - Tyco Security Products introduces the integration of IdentyTech™ fingerprint readers with Software House’s C•CURE 9000 security and event management...

Ridgefield Park, NJ, December 7 - DVTEL, which was recently acquired by FLIR, is excited to announce the next generation Ariel dome  and bullet cameras set a new standard o...

Carlsbad, CA - November 17 - Nortek Security & Control, LLC, a leader in security and access control solutions, today introduced the Linear ProControl™ embed...

HySecurity’s HydraWedge SM50 and StrongArm M30 made a huge splash among the 30,000 ASIS security show attendees at the Anaheim Convention Center in September. ...