ASSA ABLOY is working with Boston Dynamics, the global leader in developing and deploying highly agile mobile robots, to deliver the next step in strengthening security monitoring. Kicking off this year’s Global Security Exchange (GSX) in Orlando, ASSA ABLOY is introducing a new digital access solution that allows Spot security patrol robots to unlock and open accessed-controlled automated doors autonomously.
More than 20 companies are being recognized this year for products that help keep us safe.
Securitas Technology, a world leader and global provider of security, health, and safety technologies, unveiled today its Sustainability Initiatives, a pioneering effort to promote environmentally sustainable solutions in the electronic security industry. This initiative will be launched at the Global Security Exchange (GSX) 2024 show, September 23-25, in Orlando, Florida.
Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer.
- By Ralph C. Jensen
- Sep 18, 2024
It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor!
- By Brent Dirks
- Sep 18, 2024
In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively.
- By Andy Schreyer
- Sep 18, 2024
Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats.
Frederick Tucker, Allied Universal security professional, has been honored with the 2023 Ralph Day Memorial Security Officer Heroism Award for his life-saving actions during a shooting at the Nashville Metro Public Library. The award is the highest recognition a security officer can receive for an act of heroism.
After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool.
Research from the National Skills coalition (NSC) suggests that 92% of today’s jobs require digital skills. It’s frankly hard to believe that figure isn’t at 100 percent. Businesses of all kinds are significantly impacted by applications that manage all sorts of transactions internally and externally. The capture, storage, and use of data is prolific across all industries—and subject to increased risk of unauthorized access and cybersecurity breaches.
- By Perry Carpenter
- Sep 16, 2024
During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery.
- By Monique Merhige
- Sep 13, 2024
PureTech Systems, a provider of geospatial AI-boosted video analytics for perimeter and border security, is excited to announce the expansion of their perimeter solutions by further integrating with Axis Communications products. The most recent integration combines PureTech's patented video analytics with the detection capabilities of the Axis Communications D2110-VE security radar.
ISC East, with its premier sponsor Security Industry Association (SIA) and in partnership with the ASIS NYC Chapter, announced this year’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination.
ASSA ABLOY has acquired Level Lock, a technology solutions business based in Redwood City, California.
Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks.
A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries.
- By Charles Pitman
- Sep 11, 2024
Genetec Inc. today announced the launch of Operations Center, a cloud-based work management solution designed specifically for physical security operations. Available as part of Security Center SaaS, or as a standalone product, this new solution is specifically designed for security operations professionals and will revolutionize the way physical security teams collaborate, communicate, and manage their tasks.
In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification.
- By Tony Byerly
- Sep 10, 2024
IANS Research and Artico Search recently unveiled the 2024 Security Budget Benchmark Report, offering critical insights into the state of security budgets and staffing amidst a backdrop of global economic challenges. This comprehensive study compiled findings from the fifth annual CISO Compensation and Budget Research Survey, including responses gathered from over 750 Chief Information Security Officers (CISOs) between April and August 2024. The report indicates a cautious yet necessary expansion in security spending.
Colin Gray, the father of the 14-year-old Georgia school shooting suspect, has also been charged in connection with the attack. The 54-year-old father was charged with four counts of involuntary manslaughter, two counts of second-degree murder and eight counts of cruelty to children. More charges are expected.
- By Brent Dirks
- Sep 09, 2024
Event season is well underway, with organizations across industries hosting bustling customer conferences, flagship brand events and exclusive meetups for their top VIPs. As security leaders’ partner with events teams, and brand leaders ensure the safety of all attendees, there is a major consideration they must plan for: The upcoming election.
- By Dave Baker
- Sep 09, 2024
From border security to parking lots, ALPR has gained traction across multiple use cases as the technology becomes more accurate and affordable than ever. I spoke with Jason Cook, business development director at Vaxtor, a leader in ALPR AI-based analytics, and Rui Barbosa, category manager, Surveillance Products at i-PRO, a maker of AI-enabled security cameras, to delve into the latest advancements and applications of ALPR technology. Automated License Plate Recognition (ALPR) has transformed significantly over the years, evolving from a niche technology into a powerful tool for a wide range of applications, particularly in border security.
- By Ralph C. Jensen
- Sep 06, 2024
The integration of smart sensors with data-driven video technology provides schools with a comprehensive solution to enhance safety and security. This combination offers advanced capabilities such as environmental monitoring, audio analytics, vape detection and unified data management, empowering schools to create a secure and healthy learning environment for students and staff.
Four people were killed and nine were hospitalized after a shooting at Apalachee High School in Winder, Georgia on Wednesday. That’s according to CNN.
Cybercrime groups, like other businesses, can create more content in less time using GenAI tools. Over the last 6 months, Netcraft identified threat actors using these technologies across a range of attacks, from innovating advance fee-fraud to spamming out the crypto space. In total, our observations show LLM-generated text being used across a variety of the 100+ attack types we cover, with tens of thousands of sites showing these indicators.
An observation as a creator of identity verification solutions is that while industry leaders are often excited by the opportunity to leverage biometrics, there are often concerns raised about the end-user mindset during the conversation. Primarily, what are end-users’ expectations of biometric technology? What concerns might they have about its usage to authenticate and protect their access?
- By Heidi Hunter
- Sep 05, 2024
We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing.
The Foundation for Advancing Security Talent (FAST) is excited to announce the launch of its Talent for Tomorrow fundraiser, coinciding with Workforce Development Month. Throughout September, FAST aims to raise $10,000 to support its mission of attracting, training and retaining new talent within the security industry. This initiative is held in partnership with the Security Industry Association (SIA) and the Electronic Security Association (ESA).
Searchlight Cyber has released its latest report, revealing key ransomware trends for the first half of 2024. Ransomware in H1 2024: Trends from the Dark Web showcases how the ransomware scene has shifted since the release of its annual ransomware report 2024 at the start of the year. The report offers key insights drawn from dark web intelligence to help organizations bolster their defenses against emerging threats.
The cyber threat landscape is constantly changing, so now more than ever, it is important for your business to have a technologically advanced Security Operations Centre (SOC).
- By Errol Fernandes
- Sep 04, 2024