A fragmented market and ecosystem mean it will take at least five years to get security to a meaningful level, explains Kevin Fogarty, technology editor at Semiconductor Engineering.

Why Industrial IoT (IIoT) Security Is So Difficult (Learn More, Videos)

By Kevin Fogarty, Semiconductor Engineering Despite the high risk of a market filled with billions of at least partially unprotected devices, it is likely to take five years or more to reach...

DISA Makes Strides to Common Access Card Replacement (Video)

The Defense Information Systems Agency’s (DISA) assured identity initiatives seek to establish and continuously validate a digital identity, for next-generation authentication, to enable the Department of Defense (DoD) to better identify individuals and...
FUSE Tether System Enables Persistent and Safe Eye in the Sky Security

FUSE Employed for Enhanced Aerial Surveil of High School Graduations

Drone Aviation, a manufacturer of tethered drones and lighter-than-air aerostats, reports that its FUSE Tether System was utilized in a first-of-its-kind application of tethered drone technology by the Oro Valley Police Department as...
The SOFWERX ThunderDrone Rapid Prototyping Event (RPE) III demonstration at Nellis Air Force Base next month. SOFWERX is a Partnership Intermediary Agreement between Doolittle Institute and the United States Special Operations Command (USSOCOM), created to investigate new technology in an effort to put the most advanced capabilities into our warfighters’ hands. (Courtesy of SOFWERX)

SOCOM Prepares for Game of Drones Prototyping Contest (Multi-Video)

What is ThunderDrone? ThunderDrone RPE III is the culmination of efforts which began in June 2017 when SOFWERX was asked by USSOCOM and the Strategic Capabilities Office to baseline where industry stood...
Long range, low cost sensor system utilizes a newly developed patent pending technology RLTD offers a unique and easily deployed intrusion detection system utilizing a single mode fiber optic cable and a single head end controller.

RLTDR Technology Breaks Cost/ Distance Barrier in Perimeter Security

There is a reason why relatively few electronic security companies specialize in Outdoor/Perimeter Security. The technology required in providing dependable solutions for larger, high-value assets and the associated installation costs often exclude...

DHS S&T Announces Winners of the $300K Biothreat Prize Competition

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) have announced the grand prize winner of its $300,000 Hidden Signals Challenge. The prize competition, issued in collaboration with the Office of...
Are these two faces the same person? Trained forensic face examiners regularly testify about such questions in court. A NIST study measuring their accuracy reveals the science behind their work for the first time, and determined that trained human beings perform best with a computer as a partner, not another person. (Courtesy of J. Stoughton, NIST)

NIST: Facial Recognition Experts Perform Better with AI (Multi-Video)

Facial recognition experts often play a crucial role in criminal cases. A photo from a security camera can mean prison or freedom for a defendant—and testimony from highly trained forensic face examiners inform juries...
Orolia’s atomic clocks and other Resilient PNT solutions play a major role in the accuracy and reliability of PNT data from GPS, Galileo, BeiDou, IRNSS and other satellite systems.

Orolia Atomic Clocks Selected for Galileo Satellite (Learn More, Videos)

Orolia, a Platinum Award Winner in the 2017 ‘ASTORS’ Homeland Security Awards Program, reports that its world-leading atomic clock solutions have been selected for the Galileo Global Navigation Satellite System (GNSS) in contracts totaling €26M. The...

Enterprise Organizations Seek End-to-End Security Solutions

By Mohammed Murad, Vice President Global Sales and Business Development at LG Electronics USA, Iris ID Systems Any enterprise organization has to approach security on two fronts – physical and the logical. Until...
A perimeter protected by a fence-mounted sensor. People and objects approaching the fence are tracked via a video analytic, enabling PTZ cameras to capture high resolution video of any intrusion attempt.

Senstar: Integrating Video Analytics & Perimeter Intrusion Detection to Deter

By Justin Schorn, Senstar VP of Product Management Adding a perimeter intrusion detection system (PIDS) to a site greatly increases its security and leverages the value of existing assets like security fences and...