Top Stories


white house

Coalition Pressures Government Agency To Recommend Ban on Government Use of Facial Recognition

Over 40 groups sent a letter to the Privacy and Civil Liberties Oversight Board on Monday asking the agency to recommend that the executive branch put a moratorium on facial recognition.

facial recognition system

Facial Recognition App Used By Law Enforcement To Identify Suspects Faces Blowback

New Jersey police are banned from using Clearview AI’s app, and Twitter has demanded that the small company delete any photos collected from its website.

campaign signs

Technology Companies Sign On To Offer Free or Discounted Cybersecurity Services to Campaigns

Seventeen companies, including Microsoft and Cloudflare, are offering security assistance to federal campaigns that often cannot afford the services themselves.



Bjorn Lidefelt

HID Global Names Björn Lidefelt President and CEO

Lidefelt was previously CCO at ASSA ABLOY

Ifrah Yousuf graphic of computer

Cyber-Insurance Rates Soaring Thanks to Rise in High-Cost Ransomware Attacks

Insurers have made “dramatic” increases in premiums for cyber-insurance and are considering lowering the ransom amounts they will pay.

CBP Sign

Customs and Border Protection Plans to Expand Use of Facial Recognition in Global Entry Program

The agency says that the privacy risks to travelers will actually be lower with the facial scans, since they will no longer have to offer fingerprint data in order to enter the U.S.

gun retailer

New Security, Video Surveillance Requirements For Illinois Gun Dealers Go Into Effect

The regulations originally required gun retailers to have a backup of all video surveillance feeds, but has since been changed.

iowa democratic party

Despite Hacking Threats, Iowa and Nevada Democratic Caucuses Will Use Mobile Apps to Tally Votes

Party leaders say they have taken steps to protect cybersecurity and that there will be paper records to verify each vote for the final results.

european union flags

European Union Contemplates Banning Facial Recognition For Three To Five Years

While the ban is on the table, EU leadership ultimately says it would be a “far-reaching measure” with the potential to stifle the development of the technology.

maryland state house

Ransomware Possession Would Become A Crime In Maryland Under Proposed Legislation

Lawmakers are trying to deter would-be hackers from carrying out cyber attacks that have paralyzed companies, hospital systems and local governments, including Baltimore’s city government.

Infusion Direct Announces New Partnership With Security Network Associates

PR firm in the security industry expands its services in 2020, selected by SNA to help grow sales for IPVideo Corporation’s HALO IOT Smart Sensor in Florida

Report: Rise Of “Conversation-Hijacking” Phishing Attacks Threatens Businesses

Because the technique involves impersonating a trusted employee, the hacking method has the potential to be unusually effective.

New Minnesota Law Allows Families to Install Internet-Connected Cameras In Senior Care Facilities

The new policies, meant to protect elder privacy, have also drawn criticism because of the requirement that families notify care facilities before they install the camera.

smart devices

Why Artificial Intelligence Is The Smart Way to Form Real Bonds With Customers

AI isn’t going to replace us, but it will make it easier to deliver services that keep people safe.

washington state capitol

Washington State Lawmakers Introduce Legislation Regulating Data Privacy, Facial Recognition

The data privacy bill would give consumers the right to access and delete data collected about them, while the facial recognition legislation would regulate government use of the software.

cambridge city hall

Cambridge Becomes Fourth Massachusetts Community To Ban Municipal Facial Recognition Use

A bill is currently before the state House that would ban government use of biometric technology until the legislature regulates how agencies can adopt it.

tree of life synagogue

Pennsylvania Opens Grant Program For Faith Based Organizations Seeking Security Upgrades

Created in the wake of a shooting at the Pittsburgh Tree of Life synagogue, the grant program opened its application process last week.

Neal Katz Appointed Central Regional Sales Manager For ZKTeco USA

Katz, who has been with ZKTeco since 2018, was promoted this month

brain scan

More Than One Billion Medical Images Remain Unprotected On The Web

Some security experts and lawmakers have criticized the Department of Health and Human Services for failing to enforce privacy laws and fine organizations that did not protect patient records.

Peter O’Neil of ASIS International Joins Mission 500 Advisory Board

“I look forward to working with the Board to help Mission 500 continue to grow and help those in need," O'Neil says

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3