Top Stories


Where to Begin in 2020

One thing for certain this new year will be the advancement of technology. This is an ongoing phenomenon that brings new developments and solutions, and introduces completely new additions to the security industry.

Going My Way

Going My Way

Artificial Intelligence (AI) continues to be a hot topic in the security industry. While true AI (a computer’s ability to think and act like a human) is still decades away, subsets of AI such as deep learning and machine learning have enabled computers to make significant strides.

The Role of Video Security

The Role of Video Security

The security industry is being pressed to do more with less while dealing with the compounded issue of managing new internal and external threats on a daily basis.



Security at 20,000 Feet

Security at 20,000 Feet

For the sake of argument, let’s say you have a massive facility in a remote location that needs security.

A Professional’s Guide

A Professional’s Guide

The interconnectivity and integrations created by the Internet of Things (IoT) deliver many benefits, but because all devices and systems can be vulnerable to breaches, this hypoconnectivity can also have a major downside.

A Measured Approach

A Measured Approach

The threat landscape continues to evolve for every business. But banks and financial services companies face especially urgent demands.

Under Lock and Key

Under Lock and Key

The interactive self-service kiosk has become a valuable, steadily growing commercial and informational tool since the launch of the first banking ATM in the 1980s. It is an essential part of our modern-day digital landscape.

verint

Moving From Legacy to Innovation

As every security professional knows well, the sector is changing rapidly thanks to emerging developments in artificial intelligence and the migration from traditional systems to integrated cyber and physical security operations.

Leveraging Technology

Leveraging Technology

Access control advancements over the years have been notable: transitioning from keys and locksets, to cards and card readers, to the sophisticated access control management systems of today.

Facebook Agrees to Pay Out $550 Million in Settlement of Facial Recognition Lawsuit

Thanks to an Illinois privacy law, eligible users will soon be able to apply for payments from Facebook for using facial scans without permission.

LifeSafety Power Promotes Matt Virga to VP Sales-North America

Physical security and access control provider adds new member to top leadership team

nist building

Federal Institute Releases Guidelines For How To Respond To Ransomware Attacks

The report, prepared by the National Institute of Standards and Technology, tested a variety of cybersecurity solutions in different IT environments to find out which methods were most effective in fighting ransomware.

white house

Coalition Pressures Government Agency To Recommend Ban on Government Use of Facial Recognition

Over 40 groups sent a letter to the Privacy and Civil Liberties Oversight Board on Monday asking the agency to recommend that the executive branch put a moratorium on facial recognition.

facial recognition system

Facial Recognition App Used By Law Enforcement To Identify Suspects Faces Blowback

New Jersey police are banned from using Clearview AI’s app, and Twitter has demanded that the small company delete any photos collected from its website.

campaign signs

Technology Companies Sign On To Offer Free or Discounted Cybersecurity Services to Campaigns

Seventeen companies, including Microsoft and Cloudflare, are offering security assistance to federal campaigns that often cannot afford the services themselves.

Bjorn Lidefelt

HID Global Names Björn Lidefelt President and CEO

Lidefelt was previously CCO at ASSA ABLOY

Ifrah Yousuf graphic of computer

Cyber-Insurance Rates Soaring Thanks to Rise in High-Cost Ransomware Attacks

Insurers have made “dramatic” increases in premiums for cyber-insurance and are considering lowering the ransom amounts they will pay.

CBP Sign

Customs and Border Protection Plans to Expand Use of Facial Recognition in Global Entry Program

The agency says that the privacy risks to travelers will actually be lower with the facial scans, since they will no longer have to offer fingerprint data in order to enter the U.S.

gun retailer

New Security, Video Surveillance Requirements For Illinois Gun Dealers Go Into Effect

The regulations originally required gun retailers to have a backup of all video surveillance feeds, but has since been changed.

iowa democratic party

Despite Hacking Threats, Iowa and Nevada Democratic Caucuses Will Use Mobile Apps to Tally Votes

Party leaders say they have taken steps to protect cybersecurity and that there will be paper records to verify each vote for the final results.

Featured

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3