Top Stories


A Break from Routine

A Break from Routine

It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later.

Gallagher appoints Melissa Vidakovic as new Marketing Director 

Award-winning global security leader, Gallagher, is excited to announce that Melissa Vidakovic has been named marketing director for the Americas. Melissa joins Gallagher with nearly 20 years of marketing experience in technology and software for companies across North America.

On Notice: Proactively Mitigating Cyber Vulnerabilities

We all continue to see common themes across the headlines: Economic downturn, cross-industry job cuts and global geopolitical uncertainty. For businesses around the world, the turbulent situation can create unintended gaps in critical systems or processes that are core to operations.



Until We Meet Again

Until We Meet Again

A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again.

Will Electronics Adds to its Security Team

St. Louis-based Will Electronics is pleased to welcome, Ted Serve to its team as an account manager. He brings two decades of strong sales experience in the commercial security industry.

ISC West Announces 2023 Keynote Series Speaker Lineup

ISC West Announces 2023 Keynote Series Speaker Lineup

The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada.

Cyber Hygiene: What it Looks Like for IoT Devices

Cyber Hygiene: What it Looks Like for IoT Devices

For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices.

Accelerating Security Modernization

Accelerating Security Modernization

In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes.

Securitas Technology Launches as Powerhouse Security Companies Unite Under New Name

Securitas Technology has officially launched, bringing together two of the leaders in electronic security: Securitas Electronic Security and STANLEY Security.

Rep Firm LRG, inc Announces Ownership Change

Electronic Security Factory Rep Firm LRG, inc has announced that effective March 13 that company veterans John Swinford and Kenny Hilton have purchased the organization from Chris Lanier.

Survey: Energy Security is Most Exciting Area of IoT Technology Development

Energy security tops the list of the ‘most exciting’ areas of smart utility development, ahead of climate-related and disaster management technologies.

Optiv Doubles Federal Presence with ClearShark Acquisition

Optiv, the cyber advisory and solutions leader, today announced it has acquired Maryland-based ClearShark LLC and ClearShark Services Inc. (collectively ClearShark), a premier advisor and top value-added reseller of cybersecurity and modernization technology to the federal government.

Allied Universal Acquires Landmark Event Staffing Services

Allied Universal® has announced the acquisition of Landmark Event Staffing Services, a comprehensive event security and guest services company supporting a wide range of venue and event clients nationally.

A Comprehensive Nationwide Solution

A Comprehensive Nationwide Solution

Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed.

Stop that Vehicle

Stop that Vehicle

A wayward driver. A medical emergency. Maybe someone who wants to inflict harm. These are all examples of a vehicle jumping on a sidewalk and causing injuries to pedestrians and workers. It is impossible to foresee every potential scenario where this might happen but the one solution that can stop the vehicle from doing damage are crash-rated bollards, with an emphasis on “crash rated.”

IoT Cybersecurity Pillars – Four Core Tenets of Any IoT Security Program

IoT Cybersecurity Pillars – Four Core Tenets of Any IoT Security Program

The world has seen a significant increase in cyber-attacks aimed at critical infrastructure and security products in the last few years, with Industrial Internet of Things (IIoT) devices such as security cameras, becoming prime targets for hackers.

Making Rental Property a Smart Home

Making Rental Property a Smart Home

Necessity may be the mother of invention, but Rently is the mother of inventing self-guided touring for rental properties.

EPA Emphasizes Need for Cybersecurity Resilience of Public Water Systems

EPA Emphasizes Need for Cybersecurity Resilience of Public Water Systems

The U.S. Environmental Protection Agency (EPA) recently released a memorandum stressing the need for states to assess cybersecurity risk at drinking water systems to protect our public drinking water.

Paxton Appoints New Area Managers to U.S. Sales Team

Paxton has made an exciting update to their US sales team structure to provide a laser focused approach across the United States.

Where Compliance Falls Short: Taking a Proactive Approach to Risk in the Healthcare Industry

Changes to our digital spaces in recent years have led to an increase in IT risk—especially in the healthcare space. With more digitization comes an increased number of risks. Nearly 85% of healthcare data breaches reported to the HHS Office for Civil Rights (OCR) in 2022 were attributed to hacking and IT incidents, according to data from the HHS. With more determined threat actors wanting to exploit patient data, a proactive approach to seeing, understanding and acting on risk is vital to improving the effectiveness of security.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3