Top Stories


ASIS International Announces Keynote Lineup for GSX 2024

ASIS International, the world’s largest association for security management professionals, today announced its keynote lineup for the hybrid Global Security Exchange (GSX) 2024, taking place 23-25 September in-person at the Orange County Convention Center (OCCC) in Orlando, FL and online via the GSX 2024 digital platform.

Mobile IDs, MFA and Sustainability Emerge as Top Trends in New HID Report

HID recently announced its 2024 State of the Security Industry Report, which gathered responses from 2,600 partners, end users, and security and IT personnel worldwide, across a range of job titles and organization sizes representing over 11 industries.

Hanwha Vision Showcases Cloud-connected and AI-powered Surveillance Technologies at ISC West 2024

Hanwha Vision is showcasing its growing ecosystem of cloud-based devices and apps designed to enable on-premise and remote surveillance capabilities, at ISC West 2024, Booth #14025, April 10-12 in Las Vegas. The company will also highlight the proliferation of Artificial Intelligence (AI) throughout its product lines.



Stop the Cybersecurity Blame Game

In December, genetic testing company 23andMe acknowledged a hack that led to the theft of nearly seven million customers’ data. As the New York Times reported, criminals obtained “ancestry trees, birth years and geographic locations.” This kind of digital theft may have felt personal to many of those impacted.

Security Today Announces The Govies Government Security Award Winners for 2024

Security Today is pleased to announce the 2024 winners in The Govies Government Security Awards. The awards honor outstanding government security products in a variety of categories.

Live from ISC West: Pre-Show Preview

It’s hard to believe, but ISC West 2024 is almost here. This year’s show will take place April 9-12 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from ISC West 2024 page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor!

Snap One to Display Solutions from Clare, Control4 and More at ISC West

Snap One, a manufacturer and distributor of smart-living technology for professionals and consumers, will demonstrate a range of products and solutions designed to help Partners build stronger businesses, elevate customer satisfaction, and transform the industry at ISC West 2024 Booth #10053.

Reflections of My 28th ISC West Experience

As the security industry's pinnacle event, ISC West continues to draw seasoned professionals, eager newcomers and curious innovators. Among them stands a figure whose presence has become synonymous with both the event and the industry's evolution—the veteran editor, now embarks on year 28 to the heart of innovation and security.

A Biometric Revolution

In an era where technological advancements redefine the way we live and work, the transition from classic credentials to biometric authentication stands out as a pivotal shift in the realm of security. Nearly gone are the days of traditional badges and access cards; instead, our own unique biological markers are taking center stage, offering a more secure and seamless authentication experience.

PSIA Approves PDKC Over ODSP Specification

The Physical Security Interoperability Alliance (PSIA) today announced its Public Key Open Credential (PKOC) specification has expanded to support Open Supervised Device Protocol (OSDP). The new specification, PKOC over OSDP version 1.63, was unanimously ratified by the PSIA Board on March 22. It demonstrates how the ecosystem for PKOC, an open and freely available specification, can be extended to support a range of access control use cases.

Solving Loitering and Open Access Challenges

Loitering is generally not considered a crime with few instances of arrests reported nationally, but it is becoming an increasing problem for a multitude of reasons. One being the use of private spaces such as public-faced restrooms for drug use, other forms of illicit behavior, or as safe havens where homeless individuals are seeking shelter and protection from the elements. In any case, the misuse and prolonged occupancy of publicly accessible spaces prevents them from being accessed for their intended purposes by legitimate users.

ProdataKey Software Platform Introduces Built-In Integrations with Leading Camera Manufacturers

ProdataKey (PDK), manufacturer of cloud access control platform built for mobile, now gives PDK.io system users access to immediate, turnkey integrations with cameras from five manufacturers from within its settings interface: Digital Watchdog, Hanwha Wisenet Wave, NX Witness, Turing, and Spot AI.

Shaping the Use of Technology

In the ever-evolving healthcare landscape, hospitals are increasingly turning to video technology for a range of critical applications that extend far beyond traditional security. These innovative systems play a pivotal role in several areas including inventory control, drug diversion prevention, patient monitoring, and compliance with hospital procedures and industry standards.

Adapting to See Change

Imagine a retail world rapidly transforming, a landscape where the traditional brick-and-mortar model faces the relentless tide of e-commerce. Well, there is no need to imagine as this is 2024, where market losses surpass $112 billion, and the term “retail apocalypse” is not just hyperbole but a stark reality. 

Vehicle Ramming Attacks

In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.

Enhancing Autonomy Software

In the realm of national and global security, safeguarding critical infrastructure is paramount. It is not just about erecting physical barriers; it is about deploying perimeter security software capable of autonomous detection, alerting, and deterring potential threats. The integration of autonomy software into existing perimeter security systems marks a significant advancement in this field and is now imperative for an effective system.

Early Detection and Deterrence

Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.

How to Roll Out Microsoft Copilot Securely and Ensure Data Security

Microsoft Copilot is a robust AI productivity tool integrated into Microsoft 365 applications. Copilot can significantly improve your daily workflows by assisting you with drafting documents and presentations, capturing action items in Teams meetings, analyzing data in Excel, and other tasks. However, adopting Copilot can also introduce unexpected data security risks because it is built on native access controls within Microsoft 365, meaning it can access all data a user has access to, including documents, emails, and notes. Therefore, it is crucial to prepare your organization for a secure Copilot rollout and ensure that your sensitive data remains under control in the future.

Going Beyond the Perimeter

Wireless locks are a growing segment of the electronic access control (EAC) market, increasing at a rate of 8% annually in the Americas, according to OMDIA. They can be used in a variety of applications and provide many of the benefits of traditional hard-wired access control. Depending on the type, they can be managed as standalone solutions or as part of Physical Access Control Software (PACS) systems.

The Need to Hear and be Heard

Have you ever tried to watch a movie in a movie theater and the sound suddenly stopped working? Or you attended a musical concert, but the sound system failed? What happened? More than likely, the movie or concert stopped until the sound and audio were fixed. Or if it could not be fixed, you likely departed and your money refunded. After all, it is pointless to watch a movie or attend a concert without sound. You are not getting the whole experience.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3