Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.
- By Ben Williams
- Dec 01, 2022
Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.
- By Despina Stamatelos
- Dec 01, 2022
Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.
The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.
- By Santiago Bassett
- Nov 30, 2022
Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC).
There is nothing like a product tradeshow to get your hands a “little dirty” handling and asking questions about new products. When all is said and done, the people make the difference.
- By Ralph C. Jensen
- Nov 29, 2022
The Federal Communications Commission adopted new rules prohibiting communications equipment deemed to pose an unacceptable risk to national security from being authorized for importation or sale in the United States.
NAPCO Security Technologies is pleased to offer expanded free trainings to dealers, locksmiths and integrators on both its easier-to-install, faster-to-deploy, cellular- or cloud-based access control system solutions.
ADT Commercial has announced recently that Philippe Sawaya has been selected as its first-ever Director of Artificial Intelligence (AI). In his new role, Sawaya is leading company efforts in the development and deployment of AI with exceptional analytical capabilities to support the specialized needs of commercial customers across industries.
Many comments offered regarding tradeshow attendance, and person-to-person events following that crazy pandemic were answered quickly by attending ISC East 2022. Sure, events like this have been making their way back into mainstream professional contact
- By Ralph C. Jensen
- Nov 28, 2022
Genetec, a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Sonny’s The CarWash Factory has integrated Genetec™ AutoVuTM Sharp V ALPR (automatic license plate recognition) cameras into its point-of-sale (POS) solutions used by car washes to create a frictionless retail experience for consumers, new marketing opportunities, and more efficient operations.
A look ahead to 2023 we can expect to see changes in MFA, continued Hactivism from non-state actors, CISOs lean in on more proactive security and crypto-jackers will get more perceptive.
- By Marcus Fowler
- Nov 21, 2022
Dedrone recently announced that it has formed a partnership with Axis Communications to incorporate Axis network cameras into Dedrone’s counterdrone command and control (C2) platform, DedroneTracker.
HID, provider of trusted identity solutions, recently announced the successful implementation of its mobile access solution, HID Mobile Access, and mobile-enabled Bluetooth® readers at the new Skyliner skyscraper in Warsaw, Poland.
National news reports that a shooting at the University of Virginia in Charlottesville, Va., left three university football players dead and two more individuals wounded on Sunday night. Suspect Chris Darnell Jones, 22, has been taken into custody.
- By Matt Jones
- Nov 14, 2022
It was never really a question “if” video analytics technology would live up to its promise as “the next big thing” in physical security; it was simply a matter as to when the industry would start adapting the solution en masse.
- By Brent Boekestein
- Nov 14, 2022
Vulcan Cyber, developers of the unified cyber risk and security posture management platform, recently announced the latest results of its ongoing research into vulnerability risk management initiatives and risk impact on business operations. The survey finds 75% of organizations have dedicated threat intelligence teams and two-thirds have dedicated threat intelligence budgets
Interface Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, recently announced that The Old Spaghetti Factory (OSF), a family-owned and operated restaurant chain with over 40 locations across 13 states, has chosen Interface’s suite of managed services to transform its network, voice and security infrastructure.
For the first time, and just in time for Veterans Day, U.S. Secretary of Labor Martin J. Walsh recognized ADT Commercial as one of the 835 recipients of the 2022 HIRE Vets Gold Medallion Award presented by the U.S. Department of Labor.
Hanwha Techwin is highlighting a diverse range of intelligent video surveillance solutions during ISC East 2022, Booth 701, at New York’s Javits Convention Center, Nov. 16 - 17.
Netwatch North America, the leader in proactive video monitoring solutions, today announced a premiere partnership with Eagle Eye Networks to integrate the Eagle Eye Cloud VMS (video management system) with Netwatch’s proactive video monitoring service.
Vision AI company Oosto announced its partnership with Muscogee Nation Gaming Enterprises, one of the largest tribal casino owners and operators in the U.S., to protect its flagship River Spirit Casino and Resort’s gaming floors in Oklahoma, with face-based security software incorporated throughout its facility’s cameras.
IT and security leaders must address, on average, one cyberattack per week according to a new study released titled “The State of Data Security” by Rubrik Zero Labs. Rubrik, the Zero Trust Data Security Company, commissioned a study from Wakefield Research to gather insights from more than 1,600 security and IT leaders including CISOs, CIOs, VPs, and Directors across 10 countries.
Attention all resellers and installers of security hardware and software! Have you looked into offering Solink to your customers? Solink partners with security technology resellers across North America with a unique selling model.
Many businesses have security cameras in place. However, they are often underutilized because it isn’t always easy to find necessary footage, or the operational cost of collecting evidence is too high to justify its use. Solink can help you get more ROI out of your video surveillance system.
Solink Video Alarms are creating a whole new category of alarm systems. Video alarms bring new functionality and improved ROI compared to traditional panel alarm systems.
When it comes to cybersecurity, many organizations overlook IoT devices; but it is imperative that they are given equal consideration, as these devices are connected to the internet (i.e. printers, security cameras and smart home hubs) and can serve as an open door for cyber criminals.
- By Mark Sinanian
- Nov 04, 2022
There is a lot to talk about beyond security. Milestone has a way of making it happen, hosting its 24th annual MIPS conference in Minneapolis. The message is for integrators, as well as end users, to look at and review to total infrastructure.
- By Ralph C. Jensen
- Nov 01, 2022
SonicWall recently released new threat data through the third quarter of 2022. SonicWall recorded more than 4 billion malware attempts globally while year-to-date ransomware attempts in 2022 have already exceeded full-year totals from four of the last five years. In the recent 2022 SonicWall Cyber Threat Mindset Survey, 91% of organizations reported that they are most concerned about ransomware attacks, indicating a rise of anxiety among security professionals.
Cloud data security is a serious challenge most organizations face today. The cloud was designed for collaboration where every file or data element can be shared with anyone halfway around the globe. Cloud data can also be copied, duplicated, modified and passed along very easily. To illustrate the challenge, think about 100 different variations of a redlined sensitive contract that need to be protected, and consider that each variant can have different access privileges.
- By Karthik Krishnan
- Oct 27, 2022