Top Stories


Curbing the Violence

Curbing the Violence

Let me let you in on a troubling, not-so-little secret: violence in the workplace is continuing to escalate in medical facilities, despite the fact that national assault rates have been dropping in recent years.

The First Rule, Encrypt

It used to be that the most important aspect of implementing an electronic access control system was the simple control of who went where when. Today, the requirements of these sophisticated systems go beyond.

Implementing a Data-centric Approach

A company is much more complex than an IT department or a number of buildings. It is always evolving and adding more servers, buildings and systems, and therefore, obtaining more risk, costs and threats.



Metro Proof

The lock system of the Amsterdam underground is quite extensive and includes 2,574 cylinders. GVB was able to find and implement a system that solved their key issues as well as environmental issues.

We See You

We See You

The last major advancement in commercial perimeter security was the introduction of CCTV cameras.

On the Tip of their Toes

On the Tip of their Toes

No matter where any given city places a video surveillance camera, there are privacy concerns. There is, however, another side to the story.

Encryption to Cyber Bullying

The most pervasive cyber threat in the past 11 years has been ransomware infections. Who would have even known about something like this 30 years ago, but here we are trying with all diligence to protect folders and files, or even worse, the entire hard drive.

The Backbone

The Backbone

For many years, the sage advice for cybersecurity leaders has been to take a layered approach to security, and those words have served the industry well. Unfortunately, cracks in those layers continue to leave organizations vulnerable to security attacks.

How to Respond - Encryption is used to foil decryption tools

How to Respond

Between 2005 and 2016, ransomware infections were more common than data breaches, making them the most pervasive cyber threat of the last 11 years. Ransomware attacks may encrypt folders and files or even the entire hard drive, or they may just lock the devices so that users cannot access them.

Securing the City

Securing the City

Thanks to new advancements in video analytics technology and powerful Internet of Things (IoT) edge devices; these superheroes can now be armed with new superhuman capabilities to better protect us.

Protecting ATM Connections

With the rising popularity of the Internet accessible machines, the need to protect connections between the disparate ATMs and the banks’ processing centers became critical.

Think About the Future

Think About the Future

Video is a natural choice for security because as humans, we use our eyes more than any of our other senses.

It Matters Where Its Made

When you walk through the CyberLock facility with Tammy Davis, you truly get a sense of pride, responsibility and an amazing relationship she has developed within the community.

The Potential of Biometrics

The Potential of Biometrics

Many financial institutions are looking to biometrics to enhance customer trust and convenience, and for securing the bank enterprise and facilities.

Being Connected

The security of corporate data is critical to the integrity of operations. Yet, everywhere we turn, it seems like another company has become victim to some form of cyber threat, malware or ransomware attack.

HBO Victim in Latest Cyberattack

HBO Victim in Latest Cyberattack

Unreleased episodes of HBO shows and Game of Thrones scripts have been leaked as a result of the attack.

Vehicle Crash in Los Angeles Injures Eight Pedestrians

Vehicle Crash in Los Angeles Injures Eight Pedestrians

Eight people were injured when a van hopped the curb and crashed into a group of people dining at a popular restaurant.

MivaTek Announces Robert Moeller as New Vice President of Global Sales

Will Increase Awareness, Sales of the MivaTek Mobile-Cloud Platform & Retail Brands

Business Icon Mark Cuban Joins ASIS 2017 Keynote Lineup

4-day event to draw 22,000 security pros to Dallas, TX. Advance registration savings end August 11.

Smart Appliances should have Cybersecurity Rating

Smart Appliances should have Cybersecurity Rating

Televisions, fridges and other internet-connected home appliances should carry a security rating, a police chief suggested.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3