Top Stories


Global Phishing Attacks Continue to Dramatically Grow

Global Phishing Attacks Continue to Dramatically Grow

Zscaler, Inc. recently released the findings of its 2022 ThreatLabz Phishing Report that reviews 12 months of global phishing data from the Zscaler security cloud to identify key trends, industries and geographies at risk, and emerging tactics.

Paxton Expands Global Team to Accommodate Growth

Paxton has broken all their previous manufacturing records, with this year being the busiest production period in their 36-year history.

Unlimited Technology Adds Top-Tier Security Executives to Leadership Team to Propel Ambitious Strategic Growth Plan

Unlimited Technology has announced the significant addition of three executives to its leadership team: Daniel Tews has been named CFO; Chris Horan, COO; and Joe Baker as the role of West Coast general manager.



Valuber Security Deploys Integrated Security Solutions for Government Agency Client

Valuber Security has confirmed multiple integrated security system deployments for federal agency offices in New York City.

Interface Systems Appoints Brent Duncan as CEO

Interface Systems has announced that Brent Duncan, the company’s COO and President, has been appointed as chief executive officer.

Security Industry Association Announces Founding Members of SIA Utilities Advisory Board Steering Committee

The Security Industry Association (SIA) is pleased to announce the first members of its Utilities Advisory Board Steering Committee.

Report: 90 Percent of Data Breaches in Q1 2022 Were Cyberattack Related

Report: 90 Percent of Data Breaches in Q1 2022 Were Cyberattack Related

The Identity Theft Resource Center (ITRC), a nationally recognized nonprofit organization established to support victims of identity crime, released its U.S. data breach findings for the first quarter (Q1) of 2022.

Athena Security Launches Next Generation Walk-Through Metal Detection

Athena Security announces the launch of the company’s fast, frictionless Entryway Security Solution, which is a multi-sensor walk-through metal detector allowing the faster flow of pedestrian traffic.

Can “Regular” Threat Actors Become Quasi-APTs?

The proliferation of cyber-offensive capabilities has been thoroughly discussed in recent years by academics and think tankers alike.

Biden Administration Releases Domestic Counter-Unmanned Aircraft Systems National Action Plan

The Biden Administration is releasing the first whole-of-government plan to address UAS threats in the Homeland.

Vulnerability Risks Within the Energy Sector: Current Risks and Why Going Passwordless is Vital

Vulnerability Risks Within the Energy Sector: Current Risks and Why Going Passwordless is Vital

In recent years, we’ve seen an influx of cybersecurity threats compromising energy players, from Saudi Aramco in 2012 to the Colonial Pipeline last year, both of which have had the power to halt the flow of fuel to entire states and nations. In fact, a 2019 survey of global utilities by Siemens and the Ponemon Institute showed 56% of respondents reported that, in the last 12 months, their organization experienced at least one attack that resulted in the loss of private data or an outage.

Registration Opens for Global Security Exchange (GSX) 2022

Registration Opens for Global Security Exchange (GSX) 2022

ASIS International, the world’s largest association for security management professionals, has opened registration for Global Security Exchange (GSX) 2022, a hybrid event taking place 12-14 September that will offer a digital experience on the GSX online platform as well as an in-person event at the Georgia World Congress Center (GWCC) in Atlanta, GA.

Building the Future We Deserve – A Cyber Success Story

Building the Future We Deserve – A Cyber Success Story

Consider a conventional computer. It uses a small (64-bit) processor architecture and is considered excellent for solving linear problems. Many past and present problems are linear, and 64-bit architectures have been sufficient to solve them (a 64-bit register can hold any of 264 over 18 quintillion [or 1.8×1019] different values).

Joseph Grillo Announces Retirement from ACRE

A proven and respected leader who has driven ACRE's business transformation and growth strategy, Grillo's deep knowledge of the security and access control businesses resulted in strong operating results, a track record of 11 successful acquisitions, innovative solutions and a relentless commitment to ACRE's customers, partners and employees.

Midwest Security joins ABLOY Critical Infrastructure Global Solutions National Account Partner Program

ABLOY Critical Infrastructure Global Solutions announced today that Midwest Security Products Inc. has joined its new National Accounts Partner program for top security systems integrators in North America.

Allegion to Acquire Stanley Black & Decker’s Access Technologies Business

Allegion plc, a global security products and solutions provider, has signed a definitive agreement to acquire Stanley Access Technologies LLC and assets related to the automatic entrance solutions business from Stanley Black & Decker, Inc. for $900 million in cash.

Passengers Bring Guns to TSA Checkpoints as a Dangerous Trend Continues

Passengers Bring Guns to TSA Checkpoints as a Dangerous Trend Continues

A man headed for Seattle came to a Transportation Security Administration (TSA) checkpoint at Tampa International Airport with a Bersa Thunder semi-automatic pistol. The weapon was loaded with six rounds; one bullet was chambered.

Automatic Systems Adds to Sales Force

Automatic Systems is pleased to welcome two new regional sales managers to its U.S. team. Tanya Seaman joins the company as regional sales manager covering the Southern United States.

Survey: Almost 60 Percent of Americans Concerned About Safety of Loved Ones in Hospitals, Medical Facilities

According to a new consumer survey from Global Healthcare Exchange (GHX), nearly three in five American report being concerned about the safety and security of loved ones in a hospital or medical facility.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3