Top Stories


TSA ID checkpoint

TSA Breaks Record For Highest Number of Firearms Detected at Airport Checkpoints

In 2019, TSA officers detected 4,432 firearms in carry-on baggage or on passengers, breaking the record set in 2018.

DICE Corporation Welcomes Executive Vice President Avi Lupo

Lupo comes to DICE Corporation from Kent Technologies in Miami, Florida

Security Industry Association Names Kathleen Carroll as Committee Chair of the Year

The award recognizes individuals for excellence in leading SIA committees and advancing member objectives

Enabling Prevention

For organizations that wish to monitor their premises, video surveillance is most often the first solution they think of.

Protecting the Aviation Ecosystem

Today’s airports are bigger and more inviting than ever before. With so many people moving through them as well as an increasingly wide array of services on offer, they can start to feel like miniature cities.

Powering Access Control

Powering Access Control

The new IEEE802.3bt PoE standard, also often referred to as PPoE or 4-Pair PoE, is a game-changing solution for powering 12VDC and 24VDC access control and related devices.

Where to Begin in 2020

One thing for certain this new year will be the advancement of technology. This is an ongoing phenomenon that brings new developments and solutions, and introduces completely new additions to the security industry.

Going My Way

Going My Way

Artificial Intelligence (AI) continues to be a hot topic in the security industry. While true AI (a computer’s ability to think and act like a human) is still decades away, subsets of AI such as deep learning and machine learning have enabled computers to make significant strides.



The Role of Video Security

The Role of Video Security

The security industry is being pressed to do more with less while dealing with the compounded issue of managing new internal and external threats on a daily basis.

Security at 20,000 Feet

Security at 20,000 Feet

For the sake of argument, let’s say you have a massive facility in a remote location that needs security.

A Professional’s Guide

A Professional’s Guide

The interconnectivity and integrations created by the Internet of Things (IoT) deliver many benefits, but because all devices and systems can be vulnerable to breaches, this hypoconnectivity can also have a major downside.

A Measured Approach

A Measured Approach

The threat landscape continues to evolve for every business. But banks and financial services companies face especially urgent demands.

Under Lock and Key

Under Lock and Key

The interactive self-service kiosk has become a valuable, steadily growing commercial and informational tool since the launch of the first banking ATM in the 1980s. It is an essential part of our modern-day digital landscape.

verint

Moving From Legacy to Innovation

As every security professional knows well, the sector is changing rapidly thanks to emerging developments in artificial intelligence and the migration from traditional systems to integrated cyber and physical security operations.

Leveraging Technology

Leveraging Technology

Access control advancements over the years have been notable: transitioning from keys and locksets, to cards and card readers, to the sophisticated access control management systems of today.

Facebook Agrees to Pay Out $550 Million in Settlement of Facial Recognition Lawsuit

Thanks to an Illinois privacy law, eligible users will soon be able to apply for payments from Facebook for using facial scans without permission.

LifeSafety Power Promotes Matt Virga to VP Sales-North America

Physical security and access control provider adds new member to top leadership team

nist building

Federal Institute Releases Guidelines For How To Respond To Ransomware Attacks

The report, prepared by the National Institute of Standards and Technology, tested a variety of cybersecurity solutions in different IT environments to find out which methods were most effective in fighting ransomware.

white house

Coalition Pressures Government Agency To Recommend Ban on Government Use of Facial Recognition

Over 40 groups sent a letter to the Privacy and Civil Liberties Oversight Board on Monday asking the agency to recommend that the executive branch put a moratorium on facial recognition.

facial recognition system

Facial Recognition App Used By Law Enforcement To Identify Suspects Faces Blowback

New Jersey police are banned from using Clearview AI’s app, and Twitter has demanded that the small company delete any photos collected from its website.

campaign signs

Technology Companies Sign On To Offer Free or Discounted Cybersecurity Services to Campaigns

Seventeen companies, including Microsoft and Cloudflare, are offering security assistance to federal campaigns that often cannot afford the services themselves.

Bjorn Lidefelt

HID Global Names Björn Lidefelt President and CEO

Lidefelt was previously CCO at ASSA ABLOY

Ifrah Yousuf graphic of computer

Cyber-Insurance Rates Soaring Thanks to Rise in High-Cost Ransomware Attacks

Insurers have made “dramatic” increases in premiums for cyber-insurance and are considering lowering the ransom amounts they will pay.

CBP Sign

Customs and Border Protection Plans to Expand Use of Facial Recognition in Global Entry Program

The agency says that the privacy risks to travelers will actually be lower with the facial scans, since they will no longer have to offer fingerprint data in order to enter the U.S.

gun retailer

New Security, Video Surveillance Requirements For Illinois Gun Dealers Go Into Effect

The regulations originally required gun retailers to have a backup of all video surveillance feeds, but has since been changed.

iowa democratic party

Despite Hacking Threats, Iowa and Nevada Democratic Caucuses Will Use Mobile Apps to Tally Votes

Party leaders say they have taken steps to protect cybersecurity and that there will be paper records to verify each vote for the final results.

european union flags

European Union Contemplates Banning Facial Recognition For Three To Five Years

While the ban is on the table, EU leadership ultimately says it would be a “far-reaching measure” with the potential to stifle the development of the technology.

maryland state house

Ransomware Possession Would Become A Crime In Maryland Under Proposed Legislation

Lawmakers are trying to deter would-be hackers from carrying out cyber attacks that have paralyzed companies, hospital systems and local governments, including Baltimore’s city government.

Infusion Direct Announces New Partnership With Security Network Associates

PR firm in the security industry expands its services in 2020, selected by SNA to help grow sales for IPVideo Corporation’s HALO IOT Smart Sensor in Florida

Report: Rise Of “Conversation-Hijacking” Phishing Attacks Threatens Businesses

Because the technique involves impersonating a trusted employee, the hacking method has the potential to be unusually effective.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3