G-FENCE 3000 is a standalone, virtually infrastructure-free, fence-mounted intrusion detection system using accelerometer technology for perimeter security of sensitive site configurations such as: utilities and sub-stations, oil refineries, nuclear power plants, airports, corrections, etc.

PROTECH G-FENCE 3000 Competes in 2018 ‘ASTORS’ Awards Program

Protection Technologies, Inc. (PROTECH), a US-based manufacturer and Winner in the 2017 'ASTORS' Homeland Security Awards Program, is pleased to announce the company's G-FENCE 3000 has been nominated in the 2018 'ASTORS' Awards Program. G-FENCE...
A powerful storm battered the Northeast Tuesday, with drenching rain, golf-ball-sized hail and deadly winds, which killed at least two, including an SUV that was flattened by a falling tree, killing an 11year old girl who had been sitting in her mother's car as she unloaded groceries, and knocking out power to hundreds of thousands of homes and businesses. (Image courtesy of YouTube)

Death Toll Rises After Violent Storms Slam Northeast (Multi-Video)

By Stephen Sorace, Fox News A powerful storm system pummeled the Northeast on Tuesday with drenching rain, golf-ball-sized hail and damaging winds, leaving at least two people dead and knocking out power...
The American Bar Association estimates almost one in four law firms with more than 500 attorneys experienced a security breach in 2017. Deploying a strong, well-managed email authentication solution can help prevent these fake messages from arriving and spreading to other staff, and potentially to clients. (Courtesy of DLA Piper)

Most Top Law Firms Worldwide Vulnerable to Phishing Attacks

A new study published by 250ok, a leader in advanced email analytics for Domain-based Message Authentication and Reporting Conformance (DMARC), revealed 62 percent of the top 100 law firms worldwide by...
Ivanti Identity Director powered by RES provides an attribute-based approach to identity and access with automated provisioning, workflows, and self service. People get the right levels of access based on their identity, giving them the ability to stay productive, while the business remains secure.

Ivanti Competes in 2018 ‘ASTORS’ Homeland Security Awards Program

Ivanti, the company that unifies IT to better manage and secure the digital workplace, and a Platinum Award Winner in the 2017 'ASTORS' Homeland Security Awards Program, is pleased to announce...
I-FORCE OUTDOOR WARNING SIRENS

Milwaukee Sirens Get Tamper Proof Upgrade from Award Winning ASC

Following concerns of emergency siren system exploitation—illustrated by a weather siren hack in Dallas, TX, in 2017—Milwaukee County Office of Emergency Management contracted with American Signal Corporation (ASC), a 2017 'ASTORS' Award Winner,...
The DHS Cybersecurity Strategy sets out five pillars of a DHS-wide risk management approach and provides a framework for executing our cybersecurity responsibilities and leveraging the full range of the Department’s capabilities to improve the security and resilience of cyberspace.

DHS Unveils 5 Pillar Strategy to Guide Cybersecurity Efforts (See them Here)

We depend upon cyberspace for daily conveniences, critical services, and economic prosperity. At the U.S. Department of Homeland Security (DHS), we believe that cyberspace can be made secure and resilient. DHS works...
If you have any information on Julie Bolinger contact local law enforcement. Information can be called into the U. S. Marshals Service (Mountain State Fugitive Task Force) at (304) 267-7179.

Fugitive Task Force Seeks Aid to Locate Fugitive Julie Bolinger

The Mountain State Fugitive Task Force is requesting the assistance of the public in locating fugitive Julie Bolinger, 40, formerly of Bunker Hill, West Virginia. Julie Bolinger is wanted by the...

Honoring Officers Killed in the Line of Duty (Learn More, Multi-Video)

Last year, 129 law enforcement officers died in the line of duty. This morning, at the 37th Annual National Peace Officers’ Memorial Service, President Trump joined senior officials from across the Administration...
SCOT™ is a standalone remote, portable, self-sufficient security observation tower designed to expand an organization’s security reach instantly. RAD’s unique Power System allows SCOT™ to be quickly placed virtually anywhere for short- or long-term deployments with zero investment/planning in any supporting infrastructure. SCOT is equipped with the latest AI technologies - allowing it to deliver guarding services at a fraction of the cost than any human or automated solution on the market.

RAD SCOT Competes in 2018 ‘ASTORS’ Awards (See in Action)

Robotic Assistance Devices, an innovator of artificial intelligence and robotic solutions for operational, security and monitoring needs, and the Platinum Award Winner for BestRobotic Perimeter Protection Solution in the 2017 ‘ASTORS’ Homeland Security Awards...
Harry Dean Wheeler Jr.

Man Gets 10 yrs for Craigslist Attempt to Entice a Boy (Learn More, Multi-Video)

An Oklahoma City man was sentenced Monday to 10 years in federal prison for attempting to entice a minor to have sex following a U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security...