Top Stories


In the Spirit of Security

In the Spirit of Security

Not that long ago, the very idea of a house of worship tightly controlling its doors would have been unthinkable and the antithesis of the “All are Welcome” environment such places want to create. But as we are keenly aware, the world keeps changing. So do security needs.

Report: 67 Percent of Businesses Lack Confidence of Full Recovery After Cyber Attack

New research commissioned by Cohesity reveals the majority of businesses do not have the necessary cyber resilience strategies or data security capabilities required to address today’s escalating cyber threats and maintain business continuity. Furthermore, their cyber resilience efforts are not keeping pace with cyber threats, with data security and recovery technology deficiencies reducing cyber insurance eligibility and increasing the fallout of a successful attack.

The Nation’s Infrastructure

The last 12-18 months have shown us just how important our nation’s infrastructure is to our daily lives as well as our health and safety. However, the complexity of these systems and the risks they face may sometimes make us feel that properly securing them is an insurmountable feat.

Verkada Strengthens Commitment to Privacy, Appoints Elizabeth Davies as Chief Privacy Officer

Verkada, a leader in enterprise building security and management, announced today Elizabeth Davies has joined as Chief Privacy Officer.

SIA, Embry-Riddle Aeronautical University Establish Partnership to Benefit Corporate Security Students

The Security Industry Association has established a partnership with Embry-Riddle Aeronautical University that will offer SIA memberships to all Embry-Riddle students pursuing undergraduate and graduate degrees in global security and intelligence studies

Not Your Typical Dog Next Door

Not Your Typical Dog Next Door

According to the National Retail Federation, nearly 60% of retail security executives report concerns with the rise in mass violence and active assailants over the last five years.

Cyber Threat Readiness Report Reveals Misalignment Between Execs, Security Analysts

Swimlane recently announced the release of the “2023 Cyber Threat Readiness Report” based on research conducted by Dimensional Research. The report reveals a lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to prevent business-ending breaches.

The Intelligence Needed with Any System

The Intelligence Needed with Any System

Comprehensive security systems today typically include a series of IP network cameras. How can they not? For any security system (including access control, alarms and intrusion protection) to be efficient, it needs these “eyes in the sky.” Simply calling them “eyes” anymore though does not seem to encompass all possibilities



Guest on associate violence has become part of retail security and loss prevention

Addressing Unique Challenges

Retailers of all sizes continue to have unique challenges when it comes to security and loss prevention issues. The 2022 NRF Retail Security Survey revealed that retail shrink has become an almost $100 billion problem

PureTech PurifAI Patented and AI-Boosted Video Analytics Can Help Increase Reliability and Productivity for Central Monitoring Companies.

PureTech Systems Inc., a leading provider of advanced video analytics and perimeter intrusion detection solutions, is excited to announce its membership in The Monitoring Association (TMA).

5 Myths About Business Alarm Systems

5 Myths About Business Alarm Systems

While the road to finding the most effective business alarm system might seem steep, it helps to know the truth of these five common myths.

SaaS Applications Have a Mind of Their Own

Multi-cloud environments are common and popular because they simplify what used to be complicated workflows, and they help organizations stay connected in an efficient manner.

i-PRO Adopts Advanced Cybersecurity Standards Through Implementation of Secure Element and FIPS

With the ever increasing rise in cybercrime, i-PRO Americas Inc., a global leader in professional security solutions for surveillance and public safety, is advocating for companies to install more cyber-resilient network security devices.

Verkada Recognizes ConvergeOne as its National Partner of the Year

Verkada, a leader in enterprise building security and management, recognized ConvergeOne as its National Partner of the Year for its expertise in implementing and integrating Verkada's solutions within diverse and complex environments.

Francis To Assume The Role Of Chair Of The SIA's Panel Of Executive Thought Leaders From SIA Member Companies

The Security Industry Association (SIA) has appointed Ken Francis – president of Eagle Eye Networks and a former member of the SIA Board of Directors – to serve as the new chair of the SIA Executive Advisory Board.

Security Industry Association Announces 2023 Women in Security Forum Scholarship Opportunity

Security Industry Association Announces 2023 Women in Security Forum Scholarship Opportunity

The Security Industry Association (SIA) is now accepting applications for the 2023 SIA Women in Security Forum (WISF) Scholarship, an initiative led by the SIA Women in Security Forum.

AMAG Technology Welcomes Fournier as Vice President, Product Management

AMAG Technology, an Allied Universal CompanyⓇ, announces the hiring of Roland Fournier as vice president, Product Management. The Vice President, Product Management will serve as the Lead Product Officer of AMAG Technology and is responsible for the vision, development and strategy of all Symmetry™ products.

The Importance of Employee Security Awareness Training in Cybersecurity Protocols

In today's digital landscape, organizations face a constant barrage of cyber threats that can compromise sensitive data, disrupt operations, and damage reputations.

New Malware Discovered Targeting Small Office/Home Office Routers

New Malware Discovered Targeting Small Office/Home Office Routers

For the third time in the past year, Black Lotus Labs–the threat research arm of Lumen Technologies– has discovered a new malware that targets small office/home office (SOHO) routers.

Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

Survey: Only 2% of Organizations Feel Confident with Current Cybersecurity Strategies

OPSWAT, a provider of critical infrastructure protection (CIP) cybersecurity solutions, recently released the findings of its 2023 State of Web Application Security report, based on an online survey of over 400 executive leaders, managers, and senior contributors. The survey provides a deep dive into the evolving state of web applications and cloud infrastructure and highlights a concerning disconnect.

Sam Shalaby is New Owner of Wavestore VMS and Analytics Firm

Wavestore, a leader in video management software and analytics for the physical security industry, announces an exciting new chapter in the company's journey, welcoming Sam Shalaby as its new owner.

Cybesixgill Announces Global MSSP

Cybersixgill, a global cyber threat intelligence data provider, announced today its new global Managed Security Service Provider (MSSP) program, featuring a team of resolute experts and a collection of products to help MSSP partners take their security services to the next level.

Campus Security & Life Safety Rebranded as Campus Security Today

Campus Security & Life Safety Rebranded as Campus Security Today

The Infrastructure Solutions Group of 1105 Media announced today that Campus Security & Life Safety magazine has been rebranded as Campus Security Today. The new website was unveiled today at CampusSecurityToday.com, and the magazine will feature the new name and look with its September/October 2023 issue, which will have bonus distribution at GSX 2023 in Dallas September 11-13 in addition to the regular distribution to 69,400* security professionals.

AMAG Technology Appoints De Zitter as Vice President of Security & Information Management Solutions

AMAG Technology, an Allied Universal CompanyⓇ, has hired Pascal De Zitter as the new vice president of Security & Information Management Solutions (SIMS). This is a newly created role designed to develop, implement and lead a new, soon-to-be-established solutions delivery team.

Paxton Secures Highlands Grow Facility

Paxton Secures Highlands Grow Facility

Based in Lapeer, Michigan, Highlands Grow provides consumable cannabis products to U.S.-based retailers, projects. The volume of produce they cultivate is of extremely high-market value and needs to be secured with a sophisticated and advanced security system as stated by Michigan state law.

TSA Stops 3,251 Firearms At Airport Checkpoints Nationwide During the First Half of 2023

TSA Stops 3,251 Firearms At Airport Checkpoints Nationwide During the First Half of 2023

The Transportation Security Administration (TSA) intercepted 3,251 firearms at airport security checkpoints during the first half of 2023, which ended June 30. The total represents an average 18 firearms per day at TSA checkpoints of which more than 92% were loaded.

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Pluralsight recently released its second annual State of Cloud Report, which compiles survey results from more than 1,000 technologists and leaders in the United States, Europe, Australia, and India on the most current trends and challenges in cloud strategy and learning. The study findings reveal a large multicloud skills gap, underscoring how critical cloud skills development is for organizations to ensure the multicloud reward outweighs the risk.

Allied Universal CEO Steve Jones Provides Midyear Update on State of Labor Market in the Private Security Industry

Allied Universal®, a leading security and facility services provider and the world’s seventh largest private employer, is led by Global Chairman and CEO Steve Jones.

Power, Elevated

Power is a lifeline, a critical component for connected products and devices in the physical security, access control and loT industries. We know how important it is to have in our everyday lives – and for the critical infrastructure, 24/7 power is a mandate for life safety.

Envisioning the Future After Deploying SASE

Envisioning the Future After Deploying SASE

Secure Access Service Edge (SASE) converges networking functions and security tools into a unified cloud-based service delivered at each edge. It fundamentally transforms how organizations approach enterprise networking and cybersecurity. As with any transformative initiative, gaining leadership support can be the biggest challenge. CSOs and CISOs must look beyond the technical considerations to emphasize the strategic and financial value SASE provides.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3