Top Stories


Securing Overlooked IoT Devices from Cyber Criminals

Securing Overlooked IoT Devices from Cyber Criminals

When it comes to cybersecurity, many organizations overlook IoT devices; but it is imperative that they are given equal consideration, as these devices are connected to the internet (i.e. printers, security cameras and smart home hubs) and can serve as an open door for cyber criminals.

Implementing Responsible Technology

Implementing Responsible Technology

There is a lot to talk about beyond security. Milestone has a way of making it happen, hosting its 24th annual MIPS conference in Minneapolis. The message is for integrators, as well as end users, to look at and review to total infrastructure.

Report: Ransomware Attacks Trending Down in the United States

Report: Ransomware Attacks Trending Down in the United States

SonicWall recently released new threat data through the third quarter of 2022. SonicWall recorded more than 4 billion malware attempts globally while year-to-date ransomware attempts in 2022 have already exceeded full-year totals from four of the last five years. In the recent 2022 SonicWall Cyber Threat Mindset Survey, 91% of organizations reported that they are most concerned about ransomware attacks, indicating a rise of anxiety among security professionals.



Top 5 Cloud Data Security Best Practices for Cyber Awareness Month and How to Get There

Top 5 Cloud Data Security Best Practices for Cyber Awareness Month and How to Get There

Cloud data security is a serious challenge most organizations face today. The cloud was designed for collaboration where every file or data element can be shared with anyone halfway around the globe. Cloud data can also be copied, duplicated, modified and passed along very easily. To illustrate the challenge, think about 100 different variations of a redlined sensitive contract that need to be protected, and consider that each variant can have different access privileges.

Research: Cybersecurity Remains Top Concern for Physical Security Professionals

Research: Cybersecurity Remains Top Concern for Physical Security Professionals

As cybersecurity awareness month continues to be a focus of discussion in October, new research conducted by Genetec, technology provider of unified security, public safety, operations, and business intelligence solutions, shows that cybersecurity remains a top concern for physical security professionals going into 2023.

Illinois Police Department Strengthens Investigations and Community Collaboration

Genetec, a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the Naperville, Illinois Police Department (PD) is closing investigations more quickly and has strengthened community collaboration by modernizing its operations with Genetec Clearance™ and by launching a Community Camera Registration Program.

Security Industry Association Welcomes Peter Boriskin as Chair of SIA Standards Committee

The Security Industry Association (SIA) has named Peter Boriskin, chief technology officer at ASSA ABLOY Opening Solutions, as the new chair of SIA’s Standards Committee. In this role, Boriskin will lead and work with committee members to develop, promote and advocate industry standards in a coordinated effort with other standards and specification writing bodies.

Cognitec Names Andy Speropoulos as Sales Manager for Gaming, Hospitality

Cognitec, face recognition innovator and SALTO Group Company, has named Andy Speropoulos as sales manager for the gaming and hospitality markets, two important sectors that increasingly incorporate face recognition technology to improve both security and operations.

It is Time to Think about Cyber Awareness

Cyber Awareness Month is upon us and we want to share some of our best practices for what organizations can do to enhance their security posture while remaining vigilant to stay ahead of threats as best they can.

Arcules and Wesco Align Strategies to Accelerate Adoption of Cloud-Based Video Surveillance

Arcules has announced a strategic global distribution partnership with Wesco to expand brand awareness and increase access to easy, scalable, and reliable cloud and managed services in North America, Europe, Middle East and Africa.

The Talent Shortage

The nationwide talent shortage has had a ripple effect across all industries and the security industry is no exception.

The March to Mobile: How Mobile, Cloud-based Access Control is Changing Security

“Mobile” might seem like a buzzword in the access control industry these days. However, use cases and demand are rapidly increasing. According to a survey, 62% of respondents have purchased access control solutions with mobile credential options over the past two years. What’s more, an estimated 14.7 million mobile credentials were downloaded globally in 2020.

i-PRO Rolls Out New EZ-2 Partner Portal

i-PRO Americas Inc., has announced the release of the new i-PRO EZ-2 Partner Portal. Built to enhance and simplify the way integrators, resellers and distribution partners conduct business with i-PRO, the EZ-2 Partner portal features instant access to i-PRO inventory levels and enables users to create quick quotes 24/7.

Aiphone IX Series Integration with Genetec™ Security Center

Aiphone Corporation pleased to announce that its IX Series intercoms are compatible with the Genetec™ Security Center, a unified IP security platform that provides users with a single interface between multiple security devices and their data.

ADT Announces Closing of $1.2 Billion Equity Investment By State Farm

ADT today announced that it has issued and sold in a private placement to State Farm 133.3 million shares of ADT common stock for a gross purchase price of $1.2 billion.

How Individuals Can Adopt a Strong Cybersecurity Posture

How Individuals Can Adopt a Strong Cybersecurity Posture

Collectively, as an industry, we need to use the month of October to kick off an ongoing campaign that demonstrates the role each individual plays in both their own and their company’s security, as well as equips them with best practices to adopt a strong security posture. Here are a few practices that will ensure good cyber hygiene.

Cybersecurity Best Practices for Retailers

Cybersecurity Best Practices for Retailers

As retailers integrate their digital and physical shopping experiences to future-proof their business models, it’s never been more important to be aware of the cybersecurity vulnerabilities that can be created by digital transformation.

Paxton Expands Team as it Accelerates Growth in the US

Paxton Access, the global brand of electronic IP access control, video surveillance and video intercom systems, continues to expand as growth in the business continues to accelerate in the United States.

Featured

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.