Top Stories


Paxton Secures Highlands Grow Facility

Paxton Secures Highlands Grow Facility

Based in Lapeer, Michigan, Highlands Grow provides consumable cannabis products to U.S.-based retailers, projects. The volume of produce they cultivate is of extremely high-market value and needs to be secured with a sophisticated and advanced security system as stated by Michigan state law.

TSA Stops 3,251 Firearms At Airport Checkpoints Nationwide During the First Half of 2023

TSA Stops 3,251 Firearms At Airport Checkpoints Nationwide During the First Half of 2023

The Transportation Security Administration (TSA) intercepted 3,251 firearms at airport security checkpoints during the first half of 2023, which ended June 30. The total represents an average 18 firearms per day at TSA checkpoints of which more than 92% were loaded.

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Report: 85 Percent of Organizations are Adopting Multicloud Strategies

Pluralsight recently released its second annual State of Cloud Report, which compiles survey results from more than 1,000 technologists and leaders in the United States, Europe, Australia, and India on the most current trends and challenges in cloud strategy and learning. The study findings reveal a large multicloud skills gap, underscoring how critical cloud skills development is for organizations to ensure the multicloud reward outweighs the risk.

Allied Universal CEO Steve Jones Provides Midyear Update on State of Labor Market in the Private Security Industry

Allied Universal®, a leading security and facility services provider and the world’s seventh largest private employer, is led by Global Chairman and CEO Steve Jones.

Power, Elevated

Power is a lifeline, a critical component for connected products and devices in the physical security, access control and loT industries. We know how important it is to have in our everyday lives – and for the critical infrastructure, 24/7 power is a mandate for life safety.

Envisioning the Future After Deploying SASE

Envisioning the Future After Deploying SASE

Secure Access Service Edge (SASE) converges networking functions and security tools into a unified cloud-based service delivered at each edge. It fundamentally transforms how organizations approach enterprise networking and cybersecurity. As with any transformative initiative, gaining leadership support can be the biggest challenge. CSOs and CISOs must look beyond the technical considerations to emphasize the strategic and financial value SASE provides.

Viisights Wise 3.0 Ushers in Next Generation of Behavioral Recognition Video Analytics

viisights, Inc., a global leader in behavioral recognition video analytics, announces the release of Wise 3.0, ushering in the next generation of advanced proactive and preemptive analytics for professional security, safety and business intelligence applications.

Bosch to Acquire Paladin Technologies and Expand Its Building Services Business in North America

Bosch plans to acquire Paladin Technologies, Inc., headquartered in Vancouver, Canada – a provider of security and life safety solutions and system integration services in North America.



i-PRO Receives OMNIA Partners (formerly NCPA) Award to Help Protect the Public Sector with Edge-based AI Analytics

i-PRO Americas Inc., a global leader in professional security solutions for surveillance and public safety, today announced that it has been awarded a contract from OMNIA Partners (formerly NCPA).

Gunnebo Entrance Control Welcomes New Marketing Team to Drive Growth and Innovation

Gunnebo Entrance Control, a global provider of entrance control solutions, is pleased to announce the expansion of its marketing team, with new appointments dedicated to driving growth, enhancing brand visibility and delivering innovative marketing strategies.

SaaS Applications Have a Mind of Their Own

Multi-cloud environments are common, and popular because they simplify what used to be complicated workflows, and they help organizations stay connected in an efficient manner. They do, however, also pose a significant cybersecurity challenge because they allow users to play multiple roles and have numerous constantly changing privileges.

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

City of Las Vegas Better Secures Access to Sensitive Data, Critical Infrastructure

Veza recently announced that City of Las Vegas has deployed Veza to secure access to sensitive data and critical infrastructure as it moves from a centralized, legacy infrastructure to a hybrid, multi-cloud environment.

DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets, Verifiers

DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets, Verifiers

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced a new solicitation to create, improve and implement a new set of tools that protect the privacy of individuals when using digital credentials that can be used for a variety of purposes including travel, immigration and citizenship status, employment, residency status and more.

IDIS Expands It's Outside Sales Team With The Addition Of 1 Volt Associates

IDIS, a manufacturer of trusted South Korean-made video tec, is pleased t announce it has retained manufacturer’s rep firm 1 Volt Associates to broaden its presence in the Eastern and Mid-Atlantic regions.

Winter is coming - is Your Access Management Process Recession-proof?

Last year, we survived the summer of ransomware and faced a potential global recession, higher inflation and geopolitical tension - a wobbly energy market and rising interest rates. The million-dollar question is what the state of an exhausted workforce means to cyber security, especially as recessions bring a high turnover rate.

AMAG Technology Welcomes Ann Marie Mansfield as Director, Commercial Excellence

AMAG Technology, an Allied Universal CompanyⓇ, announces the hiring of Ann Marie Mansfield as the director, Commercial Excellence.

Iris ID is the Lead Supplier of Iris Biometric Technology for Participants in the FBI Iris Service

Iris ID, a global leader in iris recognition technology for 25 years has been supporting the FBI since the initial pilot of the Next Generation Identification (NGI) Iris Service in 2014.

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Keeper Security has recently released the results of its latest study, The Keeper Password Management Report: Unifying Perception with Reality. Assessing the password habits of over 8,000 individuals across the US, UK, France and Germany , the report reveals that 3 in 4 (75%) people globally don't adhere to widely-accepted password best practices, with a majority (64%) either using weak passwords or repeat variations of passwords to protect their online accounts.

MCi Protects its Customers Worldwide with Enterprise-grade Cyber Security

Serving state, local governments and global Fortune 100 companies in the energy, mining, manufacturing, and chemicals industries, Management Controls Inc. (MCi) needed to transform its cyber security to the world-class level expected by its long list of prestigious customers.

Iris ID Works with Leading Fortune 100 Companies

Iris ID, a provider of iris recognition technology for 25 years, continues to experience outstanding success in establishing partnerships with numerous Fortune 100 companies. Leveraging its cutting-edge iris recognition technology, Iris ID has emerged as a preferred choice for enhancing security measures using the highest form of biometric identity authentication and verification to best safeguard the integrity of critical operations at leading organizations.

Hanwha Vision America Integrates WAVE VMS with AMAG Access Control Systems

Hanwha Vision America has completed the integration of its Wisenet WAVE video management system with AMAG Technology's Symmetry Access Control software, delivering greater system choice and flexibility for customers, especially in AMAG’s key markets including data centers, finance, banking, commercial, healthcare and education.

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Nearly three-quarters of all cyberattacks involve ransomware which means a majority of defenders are failing to detect ransomware successfully. The fact is, ransomware isn’t the first stage of the attack, it’s often the last stage; and cyberattacks usually get labeled or categorized as ransomware when data is encrypted or stolen and a ransom is demanded by cybercriminals.

How AI Platforms Like ChatGPT will Heighten Imposter Attacks—and How to Fight Them

How AI Platforms Like ChatGPT will Heighten Imposter Attacks—and How to Fight Them

Everyone in recent months has been busy either debating the merits of ChatGPT and similar natural language generators—or have been busy using them. The amount of material these AI-driven platforms will produce is mind-boggling, since there seems to be no shortage of businesses and content writers who feel they can benefit from the striking shortcuts these platforms provide. ChatGPT was in fact able to reach 100 million users in its first two months of public existence.

Metrasens and Transparent BPO Partner to Enhance Safety of Client Data

Metrasens and Transparent BPO Partner to Enhance Safety of Client Data

Metrasens, a provider of advanced detection systems for security and safety applications, is proud to announce its partnership with Transparent BPO, a business process outsourcing and contact center organization. This collaboration further enhances Transparent BPO’s already impressive security infrastructure to protect client data.

Survey: More Than 40% of IT Leaders Doubt Their Digital Infrastructure Is Prepared to Accommodate AI Tech

More than four in 10 IT leaders surveyed globally (42%) believe their existing IT infrastructure is not fully prepared for the demands of artificial intelligence (AI) technology, despite its widespread adoption across industries

Why Integrators Should Offer Surge Protection

Why Integrators Should Offer Surge Protection

Picture this – you have just completed a relatively large security system installation for a new enterprise client. The cost of this new system was well into the hundreds of thousands of dollars, representing a significant investment for both you and the deploying organization. But less than a month after install, the customer calls you upset and in a panic.

Why Hackers Have Their Sights Set on Healthcare

Why Hackers Have Their Sights Set on Healthcare

We see it time and time again, the headlines splashed along newspapers and email newsletters that a hospital or its network of offices have been hit in a cybersecurity attack. Now more than ever, we continue to expect that attackers will target nursing homes, doctors’ offices, and other medical facilities due to the immense pressure the industry is facing to modernize. While the advancements in technology are vital to ensuring better patient care, they also open doors for threat actors everywhere.

Holley Hunt Joins Robotic Assistance Devices as Vice President of Strategic Partnerships

Artificial Intelligence Technology Solutions, Inc. a global leader in AI-driven security and productivity solutions along with its wholly owned subsidiary, Robotic Assistance Devices Inc. (RAD), today announced that Holley Hunt has joined RAD in the newly created role of Vice President of Strategic Partnerships.

Meet Modern IP Audio Solutions

Meet Modern IP Audio Solutions

When Binghamton University decided to upgrade its security capabilities, university administrators made sure to include cutting-edge audio solutions.

Altronix Appoints New Rep Firms to Strengthen its Footprint in the Northeast U.S. and Canada

Altronix, a leading manufacturer of low voltage power supplies and transmission solutions for the professional security industry, announces the appointment of two new independent sales teams covering the Northeast United States and all of Canada.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3