Top Stories


Recognize Women Who Lead, Inspire and Innovate in the Global Security Industry

SIA Women in Security Forum (WISF) is now accepting nominations for the 2023 WISF Power 100!

Eagle Eye Networks Releases 2023 Video Surveillance Trends Report

Eagle Eye Networks has released the “2023 Trends in Video Surveillance” ebook, identifying five trends that will have the largest impact on businesses around the globe in 2023.

What is wrong with this Picture?

What is Wrong With This Picture?

Recently, the industry has been buzzing about video analytics technologies. The talk is about how they have the intelligence to help prevent potentially threatening events from escalating, and even proactively detect threats before they take place.



Proactive Cybersecurity: Increased Safety Measures Make All the Difference

The infrastructure of the United States is under attack, as foreign criminals use advanced skills and exploit company vulnerabilities to cripple operations, disrupt industrial control systems, and ultimately inflict significant damage, both monetarily and economically.

Predicting the Cybersecurity Future

Predicting the Cybersecurity Future

Wouldn’t it be nice to have a crystal ball to understand exactly what we can expect in 2023 from the Cybersecurity world?

Paxton Hires Kevin MacKenzie in Keeping with Growth Strategy

Paxton, the global brand of electronic IP access control, video surveillance and video intercom systems, has hired a new and highly experienced addition to their U.S. sales team, as they continue to accelerate growth across North America.

New York Skyline

The Cost of Security

Traveling to and participating in ISC East is always a pleasure. For me, I can get a little closer to learning about security solutions, and possibilities for integration tomorrow. I always ask the question of “this is a great solution, but what will it do tomorrow?”

Risk-based Approach to Festivals and Fairs

Risk-based Approach to Festivals and Fairs

The event security industry, which includes concerts, conventions, sporting and other special events, was one of the sectors hit hardest by the global pandemic, as events ground to a halt overnight, but the sector has come roaring back to life with lightning speed.

Key Tech Trends

Key Tech Trends

Video analytics is in the midst of a revolution. For decades, the video surveillance goal was primarily to record video for later review in the event of a security-related incident.

Creating a Stance

Creating a Stance

Video security systems have been effective deterrents to crime because of its ability to capture and present evidence of events that have happened. Such systems can be invaluable in protecting people and assets.

Driving Security to News Heights

According to a 2022 study conducted by Ponemon Institute, the average U.S. enterprise manages approximately 135,000 endpoint devices. Given that most, if not all of these devices require dependable power to maintain functionality, the need to deliver reliable power efficiently to devices, which is critical to building safety, security and comfort have never been higher.

Control Your Room

Control Your Room

There is an understanding that doing a job right requires the right tools. However, recent years have seen rising awareness that furniture does not merely provide a post from which to do a job. Instead, contributing to successful outcomes requires the right furniture.

Looking Forward to 2023

Talking to an industry associate in early November, we laughed a little bit about the fact that it is (almost) 2023. Well, we were planning for print material for next year. The conversation led us into a quick discussion about Y2K.

Video Metadata: Describing the Details that Matter

Modern surveillance systems generate an overwhelming (and mostly unused) amount of data. This is especially true when recording video in 24/7 operations, which is essential to capturing evidence, incidents and events

Constantly Evolving

Constantly Evolving

Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.

Is your access control system cyber secure?

Is Your Access Control System Cyber Secure?

Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.

Fortanix Expands Relationship with AWS, Fortanix Data Security Manager Works with the AWS KMS External Key Store

Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.

Debunking the Misconceptions of Open Source Security Platforms

The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.

Featured

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • The Progress of Biometrics

  • Next-Gen AI for Smart Cities

    The future of smart city technology is not being shaped in Silicon Valley — it is taking root in Dubuque, Iowa. With a population of about 60,000, this mid-sized city has become a live testbed for AI-driven traffic management thanks to a unique public-private collaboration led by Milestone Systems. Project Hafnia demonstrates how cities can transform urban mobility and safety through Responsible Technology—without costly infrastructure overhauls. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.