Top Stories


New Minnesota Law Allows Families to Install Internet-Connected Cameras In Senior Care Facilities

The new policies, meant to protect elder privacy, have also drawn criticism because of the requirement that families notify care facilities before they install the camera.

smart devices

Why Artificial Intelligence Is The Smart Way to Form Real Bonds With Customers

AI isn’t going to replace us, but it will make it easier to deliver services that keep people safe.

washington state capitol

Washington State Lawmakers Introduce Legislation Regulating Data Privacy, Facial Recognition

The data privacy bill would give consumers the right to access and delete data collected about them, while the facial recognition legislation would regulate government use of the software.

cambridge city hall

Cambridge Becomes Fourth Massachusetts Community To Ban Municipal Facial Recognition Use

A bill is currently before the state House that would ban government use of biometric technology until the legislature regulates how agencies can adopt it.

tree of life synagogue

Pennsylvania Opens Grant Program For Faith Based Organizations Seeking Security Upgrades

Created in the wake of a shooting at the Pittsburgh Tree of Life synagogue, the grant program opened its application process last week.

Neal Katz Appointed Central Regional Sales Manager For ZKTeco USA

Katz, who has been with ZKTeco since 2018, was promoted this month

brain scan

More Than One Billion Medical Images Remain Unprotected On The Web

Some security experts and lawmakers have criticized the Department of Health and Human Services for failing to enforce privacy laws and fine organizations that did not protect patient records.

Peter O’Neil of ASIS International Joins Mission 500 Advisory Board

“I look forward to working with the Board to help Mission 500 continue to grow and help those in need," O'Neil says



2020 computing

The IoT Rundown For 2020: Stats, Risks, and Solutions

Weak passwords, insecure network services and a lack of secure update mechanisms top the list of risks for companies utilizing IoT technology.

capitol hill

New Bill Would Update Children’s Online Privacy Law In Wake Of YouTube, TikTok Controversies

The bipartisan measure would allow parents to delete information collected by companies about their kids and raise the age of parental consent protection from 13 to 16.

TSA agent

Airports, Ports of Entry on High Alert After Iranian Missile Attack on U.S. Troops

Airlines are also suspending flights to and from Iraq, Iran and other countries due to threats of missile attacks, one of which is suspected to have downed a Ukrainian passenger plane.

new york subway

Group Sues New York City MTA For Records On Facial Recognition Use in Subway Station

The Metropolitan Transportation Authority maintains that it has not used facial recognition on riders, but privacy advocates want records related to the technology the agency purchased.

TikTok app

TikTok Fixes Cybersecurity Flaws That Could Have Allowed Hackers to Upload, Delete Videos

Following the disclosure of several security issues, TikTok issued a patch to ensure that user privacy was protected.

fbi seal

FBI Warns U.S. Companies About Recent Scourge of “Maze” Ransomware Attacks

The advisory warned businesses about cyber attacks featuring cryptocurrency sites and spam campaigns impersonating government agencies.

cloud computing

Leverage the Cloud for Event Security

Technology advances have made security and access management more efficient.

department of homeland security flag

DHS Warns of Iran’s Potential To Retaliate With Cyber Attacks, Terrorist Acts After Soleimani Killing

The department warned in an alert that Iran has a “robust cyber program” and can carry out attacks to temporarily disrupt critical infrastructure.

ring doorbell camera

Ring Responds to Hacking Reports With New Privacy Options In Mobile App

The company has faced complaints, and a lawsuit, from customers that hackers were able to take over accounts and speak to children through the doorbell camera’s speaker.

Securitas Electronic Security Acquires Customer Contracts of iVerify

Ohio alarm monitoring and systems integration security company made announcement on Jan. 1

SALTO Systems Names Matt Hanert as Regional Sales Manager for the Great Lakes Region

Sales manager oversees growth in Michigan, Illinois, Ohio and more

Cybersecurity Defense Strategies for Video Management Systems

Network design considerations for video management are essential to ensuring system performance, data integrity, and threat mitigation. The challenge is that system integrators are confronted with a multitude of existing situations which often do not meet industry or manufacturer best-practice standards in today’s dynamic cybersecurity-centric world.

2020 logo

A New Decade Means A New Frontier in Technology and Security

Can we imagine a new decade in which we protect our privacy and security while still maintaining innovation and freedom online?

facial recognition system

Majority of Facial Recognition Systems Are Less Accurate For People of Color, Federal Study Finds

Native Americans had the highest rates of false positives, while African-American women were most likely to be misidentified in a law enforcement database.

porch package

Study: One in Four Americans Have Had Package Stolen By “Porch Pirates”

Nearly half of Americans don’t believe that delivery companies are doing enough to prevent theft, but the survey respondents also aren’t willing to change their online shopping habits.

The Will-Burt Company Appoints Richard Lewin Chief Executive Officer

Lewin will take over as CEO of the 102-year-old company on Jan. 1

ring doorbell camera

Ring Faces Intense Scrutiny After Reports That Thousands of Users’ Information Was Leaked Online

The security camera company owned by Amazon says that there was not a breach of its servers and blame the issue on lax cybersecurity practices by users.

Housing and Urban Development

Lawmakers Seek Answers on HUD's Use of Facial Recognition

Eight Democrats in the House and Senate want to know if public housing residents are included in decisions about facial recognition use.

child smart watch

Millions of Children-Tracking Smartwatches Are At Risk Of Being Hacked

New findings by security firm Pen Test Partners reveal that 47 million devices worldwide could be exposed and tracked thanks to a strikingly insecure cloud platform.

washington metro

TSA, Washington Metro Test Out New System That Can Detect Explosive Devices on Passengers

The non-invasive system has been implemented by more transportation authorities around the world to address threats of terrorism in public spaces.

dark twitter screen

Hackers Targeted Epilepsy Foundation With Strobe Lights Aiming to Induce Seizures

The foundation has reported at least 30 incidents that targeted their Twitter account and followers last month with GIFs and videos of harmful strobe lights.

christmas shopping

Don’t Let ‘Christmas Phishing’ Ruin Your Holiday Season

As shoppers try to find deals in time to put presents under the tree, phishing campaigns are making it more difficult for consumers to tell if a website is naughty or nice.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3