Today, the Department of Homeland Security announced the availability of $279.9 million in grant funding for the Fiscal Year (FY) 2024 State and Local Cybersecurity Grant Program (SLCGP). Now in its third year, this program provides funding to state, local, and territorial (SLT) governments to help reduce cyber risk and build resilience against evolving cybersecurity threats.
ASSA ABLOY is working with Boston Dynamics, the global leader in developing and deploying highly agile mobile robots, to deliver the next step in strengthening security monitoring. Kicking off this year’s Global Security Exchange (GSX) in Orlando, ASSA ABLOY is introducing a new digital access solution that allows Spot security patrol robots to unlock and open accessed-controlled automated doors autonomously.
More than 20 companies are being recognized this year for products that help keep us safe.
Securitas Technology, a world leader and global provider of security, health, and safety technologies, unveiled today its Sustainability Initiatives, a pioneering effort to promote environmentally sustainable solutions in the electronic security industry. This initiative will be launched at the Global Security Exchange (GSX) 2024 show, September 23-25, in Orlando, Florida.
Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer.
- By Ralph C. Jensen
- Sep 18, 2024
It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor!
- By Brent Dirks
- Sep 18, 2024
In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively.
- By Andy Schreyer
- Sep 18, 2024
Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats.
Frederick Tucker, Allied Universal security professional, has been honored with the 2023 Ralph Day Memorial Security Officer Heroism Award for his life-saving actions during a shooting at the Nashville Metro Public Library. The award is the highest recognition a security officer can receive for an act of heroism.
After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool.
Research from the National Skills coalition (NSC) suggests that 92% of today’s jobs require digital skills. It’s frankly hard to believe that figure isn’t at 100 percent. Businesses of all kinds are significantly impacted by applications that manage all sorts of transactions internally and externally. The capture, storage, and use of data is prolific across all industries—and subject to increased risk of unauthorized access and cybersecurity breaches.
- By Perry Carpenter
- Sep 16, 2024
During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery.
- By Monique Merhige
- Sep 13, 2024
PureTech Systems, a provider of geospatial AI-boosted video analytics for perimeter and border security, is excited to announce the expansion of their perimeter solutions by further integrating with Axis Communications products. The most recent integration combines PureTech's patented video analytics with the detection capabilities of the Axis Communications D2110-VE security radar.
ISC East, with its premier sponsor Security Industry Association (SIA) and in partnership with the ASIS NYC Chapter, announced this year’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination.
ASSA ABLOY has acquired Level Lock, a technology solutions business based in Redwood City, California.
Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks.
A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries.
- By Charles Pitman
- Sep 11, 2024
Genetec Inc. today announced the launch of Operations Center, a cloud-based work management solution designed specifically for physical security operations. Available as part of Security Center SaaS, or as a standalone product, this new solution is specifically designed for security operations professionals and will revolutionize the way physical security teams collaborate, communicate, and manage their tasks.
In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification.
- By Tony Byerly
- Sep 10, 2024
IANS Research and Artico Search recently unveiled the 2024 Security Budget Benchmark Report, offering critical insights into the state of security budgets and staffing amidst a backdrop of global economic challenges. This comprehensive study compiled findings from the fifth annual CISO Compensation and Budget Research Survey, including responses gathered from over 750 Chief Information Security Officers (CISOs) between April and August 2024. The report indicates a cautious yet necessary expansion in security spending.