Top Stories


A Fundamental Guide to Endpoint Security

This article aims to help demystify the various endpoint security technologies you may come across during your research, highlight the primary differences and explain how they can complement each other.

Texas Health Network Deploys AI Gun Detection and Intelligent Situational Awareness Platform

ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, today announced that its proactive gun detection and intelligent situational awareness solution has been deployed at JPS Health Network in Fort Worth, Texas to mitigate gun-related violence.

Axis Products With AXIS OS 11 Now Support IEEE 802.1AE MACsec

Axis Communications announces the support for the IEEE 802.1AE MACsec security standard in the latest release of the Axis operating system, AXIS OS 11.8, for more than 200 network devices, including cameras, intercoms, and audio speakers.



Graylog Announces Free API Security Tool Expanding Enterprise Access to API Discovery and Threat Monitoring

Graylog, a provider of Security Information and Event Management (SIEM) and log management solutions, today announces the release of a free version of Graylog API Security. This API discovery and monitoring tool makes API security accessible to enterprises of all sizes at a time when API-related attacks are on the rise. Uniquely, Graylog API Security enables organizations to identify and classify APIs, and then detect and receive alerts on threats from inside the perimeter.

Students Invited to Apply for 2024-2025 Next Generation Security Leader Scholarship

The Security Executive Council (SEC) is now accepting applications for its annual scholarship program, offering up to $7,500 to qualifying students enrolled in specific academic programs of study in the 2024-2025 academic year.

ESA Announces Call for Nominations: 2024 Board of Director Election

The Electronic Security Association (ESA) is pleased to announce the commencement of the annual election process for the Board of Directors. The Leadership Identification & Nomination Committee (LINC) invites Integrator and Associate Members of ESA in Good Standing, serving as Voting Representatives for their organizations, to participate in this crucial process.

Security Industry Association Announces Commitment to Expand Outreach to Native American Communities

The Security Industry Association (SIA) has announced a commitment to grow its outreach to Native American and indigenous communities beginning in 2024, including expanding access to SIA services and programs such as its training, scholarship and mentorship offerings.

The Wallflowers to Headline First-Ever ISC West Concert

ISC West and its premier sponsor, Security Industry Association (SIA), are thrilled to announce that Grammy-winning rock artist, The Wallflowers, will headline the first annual ISC West Concert.

World's Critical Infrastructure Suffered 13 Cyber Attacks Every Second in 2023

In the last year, the world’s critical infrastructure – the medical, power, communications, waste, manufacturing, and transportation equipment that connects people and machines – has been under near-constant attack. Forescout Research – Vedere Labs recorded more than 420 million attacks between January and December 2023. That is 13 attacks per second, a 30% increase from 2022.

Staying Ahead of Cyber Threats: Three Security Trends to Watch in 2024

In 2024, global cloud spending is expected to grow more than 20% as more organizations implement a cloud-first approach. As assets increasingly shift to hybrid and multi-cloud environments, security strategies will be top of mind while threat actors look for opportunities to exploit vulnerabilities across interconnected cloud deployments.

Versa Networks Launches Unified SASE Gateway that Scales Beyond 100 Gbps

Versa Networks, provider of AI/ML-powered Unified Secure Access Service Edge (SASE), recently announced availability of a new line of Unified SASE gateways delivering 100+ Gbps throughput to meet the growing need for compute scale, driven by the industry’s increased convergence of networking and security.

i-PRO Shares Privacy Tips for International Data Privacy Day 2024

i-PRO Co., Ltd. (formerly Panasonic security) a global leader in professional security solutions for surveillance and public safety, today shared tips on protecting the privacy of data captured from video surveillance systems. According to the United Nations Conference on Trade and Development, 137 out of 194 countries have put in place legislation to secure the protection of data and privacy. This trend is expected to accelerate this year as legislation is introduced around the ethical use of AI.

Zscaler Introduces Zero Trust SASE, Built on Zero Trust AI

Zscaler Inc., provider of cloud security, announced Zscaler Zero Trust SASE, an industry first, single-vendor SASE solution built utilizing Zscaler Zero Trust AI to help organizations reduce cost and complexity while implementing Zero Trust security across users, devices, and workloads. Additionally, Zscaler announced general availability for its Zero Trust SD-WAN solution and portfolio of plug-and-play appliances to help customers modernize secure connectivity for branch offices, factories, and data centers while also eliminating the need for ineffective firewalls and VPNs.

Strata Identity Names Erik Ruby Head of Sales to Lead Market Expansion for Identity Orchestration Platform

Strata Identity, the Identity Orchestration company, recently announced that Erik Ruby has joined the company as Head of Sales. The former Sumo Logic and SnapLogic executive brings a wealth of cloud security, SaaS, and infrastructure domain expertise to Strata’s management team and will lead market expansion for the Maverics Identity Orchestration platform.

HID and Olea Kiosks Empower People with Secure and Convenient SelfService Access

HID and Olea Kiosks, a provider of self-service kiosk solutions, today announced a new collaborative engagement that revolutionizes the user experience when it comes to access control and user authentication across a range of applications.

XTEN-AV LLC Secures Strategic Investment from Resideo Technologies

XTEN-AV LLC, a provider of Pro AV (Professional Audio-Visual) design and proposal software, proudly announces it has received a minority investment from Resideo Technologies, Inc. This investment marks a significant milestone for XTEN-AV and sets the stage for expanded growth across the Pro AV industry.

Cigent Pre-Boot Authentication Approved for Inclusion on National Security Agency Central Security Service Components List

Cigent Technology Inc, recently announced that its pre-boot authentication software has been approved for inclusion on the National Security Agency Central Security Service (NSA/CSS) components list for the Commercial Solutions for Classified (CSfC) program.

Survey: 68 Percent of IT Workers Feel Overwhelmed by Data Access Restrictions

CData Software, a provider of data connectivity solutions, recently released its research report, “Data Connectivity: The Missing Link for IT,” to offer insights into the current state of data connectivity among organizations and reveal how businesses can get the most out of their data in 2024. The survey, conducted among 550 data and analytics professionals across Operations (Ops) and IT in organizations with over 200 employees, found that increasing data requests overwhelm IT teams, but security concerns hinder their ability to provide employees with access to timely data

Allied Universal to Acquire J E Security Systems & Services Inc.

Allied Universal recently announced the proposed acquisition of the assets of J E Security Systems & Services Inc., a comprehensive guarding and technology provider based in St. Thomas, Barbados. This proposed acquisition is through Allied Universal’s subsidiary, G4S Secure Solutions (Barbados) Limited and is expected to close during the first quarter of 2024.

Navigating the SASE Landscape

Networking and security have traditionally been separate solutions layered into complex architectures. While some vendors attempted to combine security into their networking gear, this often meant throwing more boxes at customers or stitching basic filtering into their gear. This further complicated corporate infrastructures by deploying multiple tools from multiple vendors, and none of them seamlessly worked well together or shared context. Realizing this chaos required a better solution. Several vendors pursued efforts to bring networking and security together in a single solution, to varying degrees of success. And in 2019, Gartner defined these efforts as SASE, or Secure Access Service Edge.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3