Access Control | Identification

Featured Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.


Tue, 2014-12-09 05:20 PM
Technology helps the military fight the war on terror. It also helps malevolent male military personnel spy on female personnel. In a shocking announcement this week, the Navy reported that hidden...
Mon, 2014-12-08 06:24 PM
U.S. Attorney General Eric Holder announced Monday that the Justice Department (DOJ) will take new steps to bar profiling by federal law enforcement agencies, building upon a 2003 policy that had...
Wed, 2014-12-03 05:27 PM
The House of Representatives overwhelmingly passed three bills Monday aimed at strengthening nuclear security and detection, protecting critical infrastructure against the threat of electromagnetic...
Tue, 2014-12-02 06:06 PM
The United States Monday signed three customs agreements with Singapore, ensuring greater cooperation and mutual assistance on customs enforcement and the facilitation of lawful trade and travel,...
Tue, 2014-12-02 05:13 PM
A Danish citizen last week pleaded guilty in the Eastern District of Virginia and was ordered to pay a fine of $500,000 for advertising and selling StealthGenie, a spyware application that could...
Mon, 2014-12-01 05:11 PM
The Department of Homeland Security (DHS) has announced the launch of the 2015 Secretary's Honors Program Cyber Student Volunteer Initiative for current two- and four-year college students. Beginning...
Sun, 2014-11-30 08:58 PM
Dear GSN Readers: Government Security News has posted its October/November Digital Edition online. We will also be mailing out the new publication to our readers Monday morning. This edition has a...
Sun, 2014-11-30 07:21 PM
The British government introduced a far-ranging bill last week aimed at protecting U.K. citizens from international terrorism. The Counter-Terrorism and Security Bill aims to bolster the U.K.’s...
Sun, 2014-11-30 04:37 PM
Last week in federal court in Brooklyn, NY, Elvis Rafael Rodriguez was sentenced to 34 months’ imprisonment for his participation in an international cybercrime organization responsible for two...
Thu, 2014-11-27 03:26 AM
Happy Thanksgiving from Government Security News! In observance of the holiday, the Daily Insider e-newsletter will resume publication on Monday, December 1. Enjoy the holiday and safe...
Tue, 2014-11-25 07:29 PM

Charles Perez

U.S. Customs and Border Protection (CBP) recently announced the selection of a new CBP airport director for George Bush Intercontinental Airport (IAH).Charles Perez, a 28-year CBP veteran, assumed...
Tue, 2014-11-25 02:52 PM
The National Security Agency (NSA) has announced the public release of its new technology that automates data flows among multiple computer networks, even when data formats and protocols differ. The...

Company News

Newark, NJ, July 1 – Ushering in the highest standard for 4K imaging and performance in a video surveillance solution, Panasonic System Communications Company of North America has begun shipping the first of its new True 4K cameras, featuring a 12 megapixel 4K ULTRA HD imaging sensor.
When the content managers of a global technology company with a sterling reputation for delivering outstanding products and services learned that the corporate focus was shiftingto becoming green, in part through making content mobile, they quickly realized that a digitization strategy that scales to a global level would be an imperative.
Pittsburgh, PA, June 30 – Black Box Corporation, a technology solutions provider, has announced it is one of 20 industry partners awarded prime contractor status to provide information technology products and solutions to the United States Air Force through its Network-Centric Solutions 2 (NETCENTS-2) NetOps and Infrastructure Solutions Full and Open, Indefinite Delivery, Indefinite Quantity contract. NETCENTS-2 contracts provide the Air Force with a primary source of IT products, services and solutions.
Aix-En-Provence, June 29 – INSIDE Secure (Euronext Paris:INSD), a leader in embedded security solutions for mobile and connected devices, today announced availability of SafeZone FIPS cryptographic module version 1.1—the industry’s first FIPS certified cryptographic module validated on a Trusted Execution Environment (TEE).
London, June 26 – Advanced endpoint security vendor Malwarebytes has announced it has selected Blue Solutions as its first UK distributor, as part of a wider expansion into EMEA enterprise markets.
Hartford, CT, June 25 – Most midsize business leaders view a data breach among their top risks and a majority consider IT security “very important” when selecting a supplier, according to The Hartford’s survey of midsize business owners and C-level executives.
Paris, June 25 – Arkoon Netasq, a subsidiary of Airbus Defence and Space and a cyber security provider, has released version 9.1 of Stormshield Data Security, its software suite dedicated to data protection. This new version allows users to exchange email messages securely on the cloud, to protect their data on tablets on the move and to take advantage of the latest trends in technology like working on the move or collaboratively.
Moonachie, NJ, June 26 – A global provider of IT solutions and ICT services, Samsung SDS America, Inc. (Samsung SDSA) has announced that the 

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition


Click Here

Technology Sectors

Market Sectors

Commentary and Opinions

The September 11, 2001 attacks spurred increased interest in the use of biometric technologies to improve the security of visa and immigration documentation and government-issued identification card programs. Unlike traditional identification methods, which require individuals to present an identification card, a personal identification number (PIN) or a password, biometric identifiers rely on unique biological information about an individual, which is much more difficult to falsify. Iris recognition technology -- a form of biometric technology that uses pattern-recognition techniques and high-resolution images of an individual's iris -- generated significant initial interest because it is a highly accurate and less intrusive system for identification and verification than fingerprinting and other methods. Nearly 80 percent of the 1,000 U.S. residents surveyed for the Unisys Security Index, released in October 2009, said that they would be willing to use iris recognition technology. Widespread adoption remains elusive, particularly in the public sector, due to concerns about interoperability between various iris recognition technologies and a desire to avoid 'vendor lock-in,' or standardizing on a single vendor's solution.
Massive volumes of information and data are readily available across the Internet. Potential sources of valuable intelligence are contained in an endless array of Web sites, online media outlets, blogs and social networking communities. At the same time, homeland security organizations manage internal databases and access external information sources. The difficulty of connecting the unstructured textual information collected from Internet resources with structured databases restricts the contribution of Open Source Intelligence (OSINT) to the overall investigation cycle. Semantic Web offers a solution by establishing a standard for representing knowledge, such that there is a common language between computer processing and human intentions. An essential component of Semantic Web is ontology, which describes how concepts are represented in a certain knowledge domain. Using Semantic Web technology along with the appropriate ontology allows dissimilar information gathered from the Internet and stored in organizational databases to be mapped into a common semantic representation.
Incident command occurs at the local level, and during any disaster incident that local emergency response officials manage, they need to be confident that an individual's most current qualifications are readily available in order to rapidly and accurately verify the credentials of on-scene personnel.
User authentication is widely considered the weakest link in any security system, whether it controls access to buildings, computers or networks. Local, state and federal agencies struggle with striking a balance when providing users with identification procedures that are secure and, at the same time, convenient to use. Unfortunately, convenience is often sacrificed to meet security needs, requiring users to constantly change lengthy and cryptic passwords or carry badges and tokens that can be lost, "borrowed" or stolen. As a result, passwords and ID tokens, which are easily hacked and often forgotten, not only provide inadequate security but are also a constant headache for users and IT staff.
Government at every level—federal, state, and local—is focused on effectively serving constituents while simultaneously increasing the ability to cope with evolving security issues, share critical information, and maintain a growing IT infrastructure. Issues at the forefront, such as maintaining and improving IT security and complying with federal regulations, must be addressed. Even when administrators lock up their servers, apply patches and use group policy to lock down server and workstation security, it can still only take a few minutes for a hacker to unlock the keys to the kingdom: administrator/root accounts and passwords. Anyone with initiative can gain unrestricted access to systems without leaving a trace.

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.