SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alibi and MyDoorView partner for video intercom tech
    • G2E Asia highlights: Gaming & innovation trends
    • Fischer's new rugged USB-C with RLS system
    • Trustonic joins RISC-V for hardware security solutions
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Is audio underused in physical security? What are the obstacles?
    • How is AI transforming physical security?
    • ISC West update: New SoCs inside cameras drive intelligence at the edge
    • How should security adapt to the unique aspects of the corrections market?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    MOD Pizza upgrades with Hanwha Vision surveillance

    MOD Pizza upgrades with Hanwha Vision surveillance

    Sunprime & Dahua: Advanced security for solar plants

    Sunprime & Dahua: Advanced security for solar plants

    Hanwha Vision enhances security at Naval Park, New York

    Hanwha Vision enhances security at Naval Park, New York

    Verkada Enhances security for Salvation Army operations

    Verkada Enhances security for Salvation Army operations

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    46th IEEE Symposium on Security and Privacy

    46th IEEE Symposium on Security and Privacy

    Gartner Data & Analytics Summit London 2025

    Gartner Data & Analytics Summit London 2025

    Libya Build Tripoli 2025

    Libya Build Tripoli 2025

    Imagine 2025

    Imagine 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    The ultimate guide to mastering key control

    The ultimate guide to mastering key control

    Using artificial intelligence (AI) to automate physical security systems

    Using artificial intelligence (AI) to automate physical security systems

    A modern guide to data loss prevention

    A modern guide to data loss prevention

    2025 Trends in video surveillance

    2025 Trends in video surveillance

About us Advertise
  • Ultimate key control guide
  • How is AI transforming security?
  • Design vs systems
  • Women in security
  • 6
Counter terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
  • More
    Counter terror

    Counter terror - Round table discussions

    How important will body-worn cameras be moving forward?
    How important will body-worn cameras be moving forward?

    The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police miscondu...

    Emerging jobs & career opportunities in the security industry
    Emerging jobs & career opportunities in the security industry

    A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?

    What are the security challenges of protecting critical infrastructure?
    What are the security challenges of protecting critical infrastructure?

    Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this we...

    What should be the security industry’s ‘New Year’s resolution’?
    What should be the security industry’s ‘New Year’s resolution’?

    The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?” 

    How does technology innovation impact security in public spaces?
    How does technology innovation impact security in public spaces?

    Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?

    How does terrorism impact the security market?
    How does terrorism impact the security market?

    Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: Ho...

    How do news reports influence opinions about security?
    How do news reports influence opinions about security?

    When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this we...

    What are the security challenges of the hospitality market?
    What are the security challenges of the hospitality market?

    Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require tech...

    What role does social media play in promoting security?
    What role does social media play in promoting security?

    Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What...

    What are the security challenges of the enterprise market?
    What are the security challenges of the enterprise market?

    Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the en...

    Was 2017 a good or bad year for security?
    Was 2017 a good or bad year for security?

    The end of the year is a great time to take stock of one’s accomplishments during the year, and to reflect on successes and failures, where we are and where we’re going. 2017 brought a lot of change to the physical security market, but were the changes positive or negative? Our Expert Panelists tend to be a thoughtful and reflective group, so we wanted to get their thoughts and insights at year-end about 2017 in the security market. We asked this week’s Expert Panel Roundtable:...

    How can security systems be used to predict bad things?
    How can security systems be used to predict bad things?

    It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most com...

    What are the security challenges of critical infrastructure facilities?
    What are the security challenges of critical infrastructure facilities?

    They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than fo...

    What are the security challenges for schools and colleges?
    What are the security challenges for schools and colleges?

    As the new school term begins, awareness of security at all levels of educational institutions is higher than ever. Technology plays an important role in protecting educational facilities and their students, faculty, staff and visitors. Specific security challenges drive which technologies and other measures are used, and those challenges are evolving, along with the dynamic institutions security is tasked with protecting. We asked this week’s Expert Panel Roundtable: What are the security...

    Does the political climate affect spending on security systems?
    Does the political climate affect spending on security systems?

    The world of politics, like the world of security, is an environment of constant change. But do changes in one have an impact on the other? Governments around the world are involved in buying a wide variety of physical security systems, so how those governments operate certainly affects how they spend money on security. But in a broader sense, governments (and the associated political forces at work) also impact how their citizens and those in the private sector view threats and, as a logical ex...

    What are the security challenges of healthcare facilities?
    What are the security challenges of healthcare facilities?

    Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundt...

    Related white papers
    Monitoring traffic flow: Everywhere, all the time

    Monitoring traffic flow: Everywhere, all the time

    Download
    The critical importance of Trusted Execution Environment in access control

    The critical importance of Trusted Execution Environment in access control

    Download
    How to ramp up perimeter security with license plate reader technology

    How to ramp up perimeter security with license plate reader technology

    Download
    Related articles
    Physical and cyber security precautions when travelling

    Physical and cyber security precautions when travelling

    Mass security screening technology for large events

    Mass security screening technology for large events

    2018 FIFA World Cup Russia integrates safety, security and service

    2018 FIFA World Cup Russia integrates safety, security and service

    Follow us

    Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos
    Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
    About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
    1. Home
    2. Topics
    3. Counter terror
    4. Round table discussions
    About this page

    In-depth coverage of counter terror news and the latest security trends in counter terrorism. Read announcements from companies involved in counter terror initiatives and solutions. Experts and thought leaders share their insights and recommendations on counter terrorism matters.

    See this on SecurityInformed.com

    Subscribe to our Newsletter

    Stay updated with the latest trends and technologies in the security industry
    Sign Up

    DMA

    SourceSecurity.com - Making the world a safer place
    Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

    Our other sites:
    SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

    Subscribe to our Newsletter


    SourceSecurity.com
    SecurityInformed.com

    Browsing from the Americas? Looking for our US Edition?

    View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

    US Edition International Edition
    Sign up now for full access to SourceSecurity.com content
    Download Datasheet
    Download PDF Version
    Download SourceSecurity.com product tech spec