Top Stories


Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

IBM Security recently released the annual Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations.

A Business Owner’s Demand

A Business Owner’s Demand

Business owners are making the move to higher resolution cameras at a pace that defies the influences of the pandemic, supply chain challenges, and labor shortage, according to a new 2022 worldwide security camera report.

Expanding Safety-Sensitive Roles to Address Cyberattacks

The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners.

The Key to Preventing Production Network Attacks Is to Start Looking Within

The business of cybercrime is rapidly increasing in scope and scale. The cost incurred by companies due to data breaches increased by nearly 10 percent from 2020 to 2021, meaning if the cost incurred by attacks was measured against the GDPs of all the nations of the world, it would be third largest, just lagging behind the U.S. and China.

Protecting the Infrastructure

Protecting the Infrastructure

Critical infrastructure facilities can be quite large, so protecting them is a complex challenge that demands multifaceted solutions. Robust, cybersecure technology solutions exist to protect facilities of all sizes and types but getting the most out of these solutions requires attention to the human element as well.

The Ongoing Value of VSaaS

The Ongoing Value of VSaaS

Subscription-based service models are increasing in the security industry. Shifting to video subscription as a service (VSaaS) or SaaS in general involves changing the mindset that one is receiving a service rather than a product. What end users want is a system that is always current rather than a product that can quickly become out of date or is not functional when it matters most.

Adding Audio to ROI Programs

Adding Audio to ROI Programs

Across the globe, security teams are under pressure to justify what they do and how they do it. They need to continually make a strong case to internal and external shareholders for their budgets and activities.

Place Your Bets

Place Your Bets

For a casino, constant threats of theft, hacking, and fraud from guests and employees are simply table stakes. The combination of high-volume visitor traffic and significant amounts of cash can create potential security nightmares, with the cards often stacked against the house.



Woman Shot and Injured After Firing Gun At Dallas Love Field Airport

An armed woman fired several shots at the ceiling at Dallas Love Field on Monday morning before being injured by a police officer.

Playing the "A" Game

Playing the "A" Game

The cardboard fans are gone and the real fans are back, making up for lost time. They are packing stadiums, the bars and restaurants surrounding them. They’re not just going to the games. Sports venues have stretched beyond the stadium proper to incorporate pavilions and entertainment complexes, owned and managed by the franchises that feature retail, hotels, theaters and much more.

Securitas Acquisition of STANLEY Security and Healthcare Now Complete

The highly anticipated acquisition of STANLEY Security and Healthcare accelerates Securitas’ transformation journey toward technology-based solutions and its ambition to position itself as an outstanding global security and safety partner that helps make the world a safer place.

Big Solutions, Small Projects

Big Solutions, Small Projects

A lot of buzz in the security industry revolves around the explosion of the global datasphere. Especially as the COVID-19 pandemic has forced many industries to transition from in-house operations to work-from-home—if not entirely digital—formats, global data creation, consumption and circulation has skyrocketed.

Specialized Window Locks Safely Provide Clean, Ventilated Air are an Absolute Must

3-D Lockdown Supply has collaborated with Remsafe Window Locks to provide an extensive range of custodial-keyed window limiters that increase window security without compromising on ventilation for health and safety.

Bailey’s Gift Honors Kentucky High School Shooting Victim

Bailey’s Gift Honors Kentucky High School Shooting Victim

With each campus, or mass shooting for that matter, Secret Holt feels the pain of the day her daughter, Bailey, was shot and killed at Marshal County High School in rural Kentucky. That tragedy was more than four years ago, and nerves are still raw.

Study: Communities Find Success with Model Alarm Ordinance

Study: Communities Find Success with Model Alarm Ordinance

A new study by a professor at the UNC-Charlotte, Criminal Justice & Criminology Department shows that most electronic security systems in the communities studied protect life and property without generating calls for police services.

Texas House Committee Releases Uvalde Shooting Report, Criticizes ‘Lackadaisical Approach’ from Law Enforcement

A Texas House committee investigating the elementary school shooting in Uvalde, Texas, released a preliminary report on Sunday. According to national news, one of the report’s main findings is that “There is no one to whom we can attribute malice or ill motives. Instead, we found systemic failures and egregious poor decision-making.” It also makes note of “an overall lackadaisical approach” by law enforcement authorities who responded to the scene, as well as details failures by the Uvalde school system, social media platforms and the shooter’s family, according to CNN.

Only 30 Percent of U.S. Small Businesses Consider Cybersecurity Important Priority to Invest In

Fewer than 30% of small businesses in the United States view cybersecurity as a priority to invest in, according to data from Tech.co. This is despite a staggering 62% of small US businesses suggesting security breaches are a significant threat to their business growth.

Arcules Reinforces Cloud Video Leadership Position with Exclusive Canon Marketing Japan Partnership

Arcules has announced a strategic partnership with Canon Marketing Japan (Canon MJ). As part of the agreement, Canon MJ will distribute Arcules as a hybrid video cloud solution to its thousands of multi-site customers in the Japanese market.

Smiths Detection Inc., Enters Agreement with Kromek

Smiths Detection has announced that it has entered into an agreement with Kromek Group plc for Smiths Detection to distribute Kromek’s wearable radiation detection and identification solutions to North and South American markets.

RGB Spectrum Expands Sales Team

RGB Spectrum has announced the appointment of Jeffrey Wilson as a new regional sales manager responsible for the western region. His territory includes Alaska, Arizona, western Canada, Colorado, Nevada, New Mexico, Utah, and the entire Pacific Northwest.

Netwatch North America Announces Technology Integration with Hanwha Techwin

TSA Screens More than 11 Million Travelers During July Fourth Weekend

During the Independence Day holiday, the Transportation Security Administration (TSA) screened more than 11.3 million travelers from June 30 through and including Monday, July 4. The weekend travel volume represents 93% of volume for the same 5-day pre-pandemic holiday period in 2019.

RGV Agents Disrupt Human Smuggling Events and Encounter More Large Groups

Over the Fourth of July weekend, Rio Grande Valley Sector (RGV) Border Patrol agents encountered 403 migrants in three large groups and disrupted two human smuggling events.

IDIS America Supports Growth With New Hires

IDIS has announced two new hires to strengthen its marketing and sales teams in America. Luis Monsante has joined IDIS America as a marketing specialist, and Larry Lobue is the new regional sales manager for the U.S. and South Central market.

Survey: Using More Complex IT Security Strategies Doesn't Always Increase Security

A global IT security and compliance survey of 800+ IT professionals found that the rate of IT security incidents increases the more Microsoft 365 security features are used. Organizations using Microsoft 365 and that use 1 or 2 of its stock security features reported attacks 24.4% and 28.2% of the time respectively, while those that use 6 or 7 features reported attacks 55.6% and 40.8% of the time respectively.

Next Level Security in 2022: Passwordless Authentication

It’s no secret that cyberattacks and data breaches are on the rise. You’ve likely heard about it on the news or may have experienced it first-hand. A commonality between these attacks becoming easier and more frequent might surprise you—simple passwords.

Netwatch North America Announces Technology Integration with Hanwha Techwin

Netwatch North America has announced a strategic technology integration with Hanwha Techwin America, a global supplier of video surveillance solutions.

Research: Identity and Access Management Market to Reach $26 Billion by 2027

A new study from Juniper Research has found that global spend on identity & access management solutions will rise from $16 billion in 2022 to $26 billion by 2027; representing an absolute growth of 62% over the next 5 years.

DHS Awards $9.8 Million for Small Businesses to Develop Security Technology Prototypes

The Department of Homeland Security (DHS) Small Business Innovation Research (SBIR) Program awarded a total of $9,782,624 million to small businesses to further develop technologies intended to support homeland security mission needs.

ESA Discusses Fair Repair Act and its Potential Consequences for Alarm System Companies

A federal bill was filed on March 14, 2022 that could alter the contracts and practices of electronic security and life safety companies across the country, if passed. S. 3830 is titled the “Fair Repair Act” and was filed with bipartisan sponsors (Senator Ben Ray Lujan (D-NM) and Senator Cynthia Lummis (R-WY).

Hall Technologies Announces Dedicated Consultant Support

Hall Technologies announces a broadened strategic focus to provide specific support to the consultants, architects and design engineering firms who specify Hall products.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3