Top Stories


ASIS International Announces Keynote Lineup for GSX 2024

ASIS International, the world’s largest association for security management professionals, today announced its keynote lineup for the hybrid Global Security Exchange (GSX) 2024, taking place 23-25 September in-person at the Orange County Convention Center (OCCC) in Orlando, FL and online via the GSX 2024 digital platform.

The CMOOR Group Bolsters Business Development with Security Industry Veteran Dan DeBlasio

The CMOOR Group, a leading provider of cloud-based compliance and continuous education solutions for the security, fire, and life safety industry, has announced the appointment of Dan DeBlasio as Director of Business Development.

Mobile IDs, MFA and Sustainability Emerge as Top Trends in New HID Report

HID recently announced its 2024 State of the Security Industry Report, which gathered responses from 2,600 partners, end users, and security and IT personnel worldwide, across a range of job titles and organization sizes representing over 11 industries.

Hanwha Vision Showcases Cloud-connected and AI-powered Surveillance Technologies at ISC West 2024

Hanwha Vision is showcasing its growing ecosystem of cloud-based devices and apps designed to enable on-premise and remote surveillance capabilities, at ISC West 2024, Booth #14025, April 10-12 in Las Vegas. The company will also highlight the proliferation of Artificial Intelligence (AI) throughout its product lines.

Security Today Announces The Govies Government Security Award Winners for 2024

Security Today is pleased to announce the 2024 winners in The Govies Government Security Awards. The awards honor outstanding government security products in a variety of categories.

Stop the Cybersecurity Blame Game

In December, genetic testing company 23andMe acknowledged a hack that led to the theft of nearly seven million customers’ data. As the New York Times reported, criminals obtained “ancestry trees, birth years and geographic locations.” This kind of digital theft may have felt personal to many of those impacted.

Live from ISC West: Pre-Show Preview

It’s hard to believe, but ISC West 2024 is almost here. This year’s show will take place April 9-12 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from ISC West 2024 page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor!

Snap One to Display Solutions from Clare, Control4 and More at ISC West

Snap One, a manufacturer and distributor of smart-living technology for professionals and consumers, will demonstrate a range of products and solutions designed to help Partners build stronger businesses, elevate customer satisfaction, and transform the industry at ISC West 2024 Booth #10053.



Reflections of My 28th ISC West Experience

As the security industry's pinnacle event, ISC West continues to draw seasoned professionals, eager newcomers and curious innovators. Among them stands a figure whose presence has become synonymous with both the event and the industry's evolution—the veteran editor, now embarks on year 28 to the heart of innovation and security.

PSIA Approves PDKC Over ODSP Specification

The Physical Security Interoperability Alliance (PSIA) today announced its Public Key Open Credential (PKOC) specification has expanded to support Open Supervised Device Protocol (OSDP). The new specification, PKOC over OSDP version 1.63, was unanimously ratified by the PSIA Board on March 22. It demonstrates how the ecosystem for PKOC, an open and freely available specification, can be extended to support a range of access control use cases.

ProdataKey Software Platform Introduces Built-In Integrations with Leading Camera Manufacturers

ProdataKey (PDK), manufacturer of cloud access control platform built for mobile, now gives PDK.io system users access to immediate, turnkey integrations with cameras from five manufacturers from within its settings interface: Digital Watchdog, Hanwha Wisenet Wave, NX Witness, Turing, and Spot AI.

Solving Loitering and Open Access Challenges

Loitering is generally not considered a crime with few instances of arrests reported nationally, but it is becoming an increasing problem for a multitude of reasons. One being the use of private spaces such as public-faced restrooms for drug use, other forms of illicit behavior, or as safe havens where homeless individuals are seeking shelter and protection from the elements. In any case, the misuse and prolonged occupancy of publicly accessible spaces prevents them from being accessed for their intended purposes by legitimate users.

A Biometric Revolution

In an era where technological advancements redefine the way we live and work, the transition from classic credentials to biometric authentication stands out as a pivotal shift in the realm of security. Nearly gone are the days of traditional badges and access cards; instead, our own unique biological markers are taking center stage, offering a more secure and seamless authentication experience.

Adapting to See Change

Imagine a retail world rapidly transforming, a landscape where the traditional brick-and-mortar model faces the relentless tide of e-commerce. Well, there is no need to imagine as this is 2024, where market losses surpass $112 billion, and the term “retail apocalypse” is not just hyperbole but a stark reality. 

Shaping the Use of Technology

In the ever-evolving healthcare landscape, hospitals are increasingly turning to video technology for a range of critical applications that extend far beyond traditional security. These innovative systems play a pivotal role in several areas including inventory control, drug diversion prevention, patient monitoring, and compliance with hospital procedures and industry standards.

Vehicle Ramming Attacks

In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.

Enhancing Autonomy Software

In the realm of national and global security, safeguarding critical infrastructure is paramount. It is not just about erecting physical barriers; it is about deploying perimeter security software capable of autonomous detection, alerting, and deterring potential threats. The integration of autonomy software into existing perimeter security systems marks a significant advancement in this field and is now imperative for an effective system.

Early Detection and Deterrence

Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.

How to Roll Out Microsoft Copilot Securely and Ensure Data Security

Microsoft Copilot is a robust AI productivity tool integrated into Microsoft 365 applications. Copilot can significantly improve your daily workflows by assisting you with drafting documents and presentations, capturing action items in Teams meetings, analyzing data in Excel, and other tasks. However, adopting Copilot can also introduce unexpected data security risks because it is built on native access controls within Microsoft 365, meaning it can access all data a user has access to, including documents, emails, and notes. Therefore, it is crucial to prepare your organization for a secure Copilot rollout and ensure that your sensitive data remains under control in the future.

The Need to Hear and be Heard

Have you ever tried to watch a movie in a movie theater and the sound suddenly stopped working? Or you attended a musical concert, but the sound system failed? What happened? More than likely, the movie or concert stopped until the sound and audio were fixed. Or if it could not be fixed, you likely departed and your money refunded. After all, it is pointless to watch a movie or attend a concert without sound. You are not getting the whole experience.

3xLOGIC Launches VIGIL NVR Case Management Providing Cloud Storage for Sensitive Video Clips

3xLOGIC, a provider of integrated and intelligent security solutions, has launched VIGIL NVR Case Management, a cloud storage solution designed for sensitive video clips. The standalone solution provides cloud storage capability to VIGIL NVRs, making it easier for operators to review, share, and store video clips in a single place.

Going Beyond the Perimeter

Wireless locks are a growing segment of the electronic access control (EAC) market, increasing at a rate of 8% annually in the Americas, according to OMDIA. They can be used in a variety of applications and provide many of the benefits of traditional hard-wired access control. Depending on the type, they can be managed as standalone solutions or as part of Physical Access Control Software (PACS) systems.

Getting Smarter About AI

The past few years have seen companies throughout the security and surveillance industry expand their use of AI, some rapidly adopting the technology and others dipping their toes in the water. Either way, AI has certainly moved beyond being an emerging technology to now being a proven reality, with demonstrated abilities to improve security camera imaging performance, enhance the accuracy of people and object detection, reduce false alarms and conserve recording and network bandwidth.

Some New Tricks

In the constantly evolving world of AI, you can blink and miss an innovation. This rapid pace of evolution means organizations are under increased pressure to invest in solutions that do not become obsolete a short time after they are installed.

i-PRO Will Showcase Docker Container Support on X Series Line of Cameras at ISC West

At ISC West 2024 on booth # 10037, i-PRO Co., Ltd. (formerly Panasonic Security), a provider of professional security solutions for surveillance and public safety, will showcase Docker container support on its new X Series line of AI-enabled cameras. Docker containers directly support i-PRO’s open platform development initiatives by providing a standardized way for application developers to rapidly advance the AI capabilities of i-PRO edge devices.

Security Industry Association Expands Its Team to Better Serve Its Members

The Security Industry Association (SIA) has welcomed four new members to the SIA team to support the association’s members and initiatives: Rachel Tayag, associate director of learning and development; Adriana Lopez Cadima, senior manager of design and videography; Natalie Robinson, senior manager of member services; and Adom Yusuf, senior manager of standards and technology.

DHS Unveils Artificial Intelligence Roadmap

Secretary of Homeland Security Alejandro N. Mayorkas and Chief Information Officer and Chief Artificial Intelligence Officer Eric Hysen announced the Department of Homeland Security’s (DHS) first “Artificial Intelligence Roadmap.” The roadmap details DHS’s 2024 plans, including to test uses of the technologies that deliver meaningful benefits to the American public and advance homeland security, while ensuring that individuals’ privacy, civil rights, and civil liberties are protected.

To Cloud or Not to Cloud?

The cloud is a fact of life across all IT applications—and security is no exception. While most software applications today have moved to the cloud, security is a bit different. There are significant technical and budgetary challenges, particularly as the increasing volume (and image quality) of security cameras in use results in an enormous amount of video data transferred and stored in the cloud.

Municipal Digital Access

We hear about Smart Cities more frequently these days, due to considerable progress in recent years. But it is an initiative that has been around for decades. The idea emerged when analysts began using technology to collect images and data to help improve civic services, protect against disasters, and improve citizens' lives. At its core that is still the intent.

Key Management Takes Flight in Tallahassee

In 2017, after attending a national security conference, Thomas Vergo returned to his Tallahassee International Airport (TLH) office with a profound idea. Placing a significant item on both his boss's and director's desks, he sought to revolutionize their approach to access control.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3