Top Stories


Holly Borgmann Honored with ESA's Sara E. Jackson Award for Outstanding Leadership & Advocacy

The Electronic Security Association (ESA) proudly announces Holly Borgmann, Vice President, Government Affairs at ADT, as the esteemed recipient of the Sara E. Jackson Award for 2024. This prestigious accolade recognizes individuals who exemplify extraordinary leadership and dedication in advancing the electronic security and life safety industry.

Elite Interactive Solutions Salute for Police Dispatch Procedures

Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces the company was recognized this month as runner-up for the 2024 Police Dispatch Quality Award (PDQ). The prestigious honor, which is organized by the Security Industry Alarm Coalition (SIAC), was presented during a ceremony at the recent Electronic Security Expo (ESX) held in Louisville.

Nevada Transportation Commission Adopts AI-Based Gun Detection Technology

ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced it has been chosen by the Regional Transportation Commission of Southern Nevada (RTC) for wide-scale implementation. This marks the first transit agency in the United States to fully deploy weapons detection analytics, with RTC adding ZeroEyes to its state-of-the-art network to protect residents and visitors against gun-related violence.



ESA Board of Directors Approves Competency Directors and Officer Positions

Members of the Electronic Security Association (ESA) recently approved several competency director and officer positions.

ONVIF Launches New Working Groups for Cloud, Metadata and Audio

ONVIF, the leading global standardization initiative for IP-based physical security products, is announcing the formation of three new working groups that are tackling standardization work in cloud connectivity, audio and advanced metadata.

Busy South Africa Building Integrates Custom Access Control System

Nicol Corner, based in Bedfordview, Johannesburg, South Africa, is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. This is the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption. Nicol Corner (Pty) LTD has developed a landmark with sophisticated design and unique architecture by collaborating with industry-leading partners and specifying world-class equipment throughout the project. This includes installing a high-spec, bespoke security and access control system.

Industry Veteran William Tenney Named ASIS International CEO

ASIS International, the leading organization for security management professionals worldwide, today announced the appointment of William “Bill” Tenney as its new Chief Executive Officer, effective 1 July 2024. Tenney brings close to 35 years of security leadership experience from both public and private sectors to his new role heading the acclaimed global security association.

Only 13 Percent of Research Institutions Are Prepared for AI

A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions.

Survey: 70 Percent of Organizations Have Established Dedicated SaaS Security Teams

Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey Report: 2025 CISO Plans and Priorities released today by the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment.

Mobile Applications Are Empowering Security Personnel

From real-time surveillance and access control management to remote monitoring and communications, a new generation of mobile applications is empowering security personnel to protect people and places. Mobile applications for physical security systems are emerging as indispensable tools to enhance safety. They also offer many features that are reshaping how modern security professionals approach their work.

Hanwha Vision Appoints Jason Swanson as Business Development Manager for Restaurant, Retail Verticals

Hanwha Vision has named Jason Swanson as Business Development Manager for the Restaurant and Retail markets. The industry veteran will draw on his extensive store and food service experience to ensure Hanwha solutions address operators’ unique surveillance challenges and requirements for protecting their premises, employees and customers.

Convergint Gives Back Globally, Celebrates 23rd Annual Social Responsibility Day

Today, Convergint celebrates its 23rd Annual Convergint Social Responsibility Day, as nearly 10,000 colleagues across 220 global locations have the opportunity to spend the workday giving back to their local communities. This year’s efforts have resulted in a total payroll donation of more than $3 million and more than $500,000 in labor and equipment donations from Convergint colleagues, partners, and families. Additionally, 400 colleagues and partners will help complete the company’s largest STEP Up project to-date for the Douglas County School District in Castle Rock, Colorado.

2024 Secure Campus Award Winners Announced

Campus Security Today is pleased to announce the 2024 Secure Campus Award winners. Twenty-six companies are being recognized this year for products that help keep education and business campuses safe.

Study: 90 Percent of Organizations Experienced an Identity-Related Incident in Last Year

Identity-related incidents continue to dominate today's headlines. Clorox, MGM and Caesars fell prey to social engineering, while 23andMe suffered a breach as a result of a hacking method called credential stuffing and UnitedHealth lacked multi-factor authentication (MFA). Although these companies made headlines due to the extent of the breach, today's study revealed that only 10% of respondents didn't have an identity-related incident in the last 12 months, consistent with last year's report.

Cybersecurity Career Opportunities Continue to Outpace Supply

Demand for cybersecurity talent continues to outpace supply despite growth in available education and training programs, according to new data from CyberSeek, the most comprehensive source of information on the U.S. cybersecurity workforce.

ESA Launches “Empowering Women in Technology” Scholarship

Committed to breaking barriers and fostering diversity in the ever-evolving electronic security and life safety technology field, the Electronic Security Association (ESA) has launched the “Women in Technology” Scholarship.

Report Highlights How People Trick AI Chatbots Into Exposing Company Secrets

Immersive Labs recently published its “Dark Side of GenAI” report about a Generative Artificial Intelligence (GenAI)-related security risk known as a prompt injection attack, in which individuals input specific instructions to trick chatbots into revealing sensitive information, potentially exposing organizations to data leaks. Based on analysis of Immersive Labs’ prompt injection challenge*, GenAI bots are especially susceptible to manipulation by people of all skill levels, not just cyber experts.

ESA Announces 2024 Board of Directors Election Results

Members of the Electronic Security Association (ESA) recently voted for several open positions on its Board of Directors. The purpose of a director on the ESA Board is to work collectively as a team to provide good governance of ESA affairs and to set direction to optimize the growth and performance of the organization.

Report Continues to Show Physical Security Moving to Cloud-Based Solutions

Verkada today shared the results of its 2024 State of Cloud Physical Security report. Based on insights from IT and physical security leaders across various sectors, the findings look at current trends, insights, and challenges within the industry as it transitions from on-premises setups to cloud-based ones.

New FTC Data Shed Light on Companies Most Frequently Impersonated by Scammers

New data from the Federal Trade Commission shows that Best Buy/Geek Squad, Amazon, and PayPal are the companies people report scammers impersonate most often. A newly released data spotlight shows that consumers in 2023 submitted about 52,000 reports about scammers impersonating Best Buy or its Geek Squad tech support brand, followed by about 34,000 reports about scammers impersonating Amazon. PayPal was the third-most impersonated company with about 10,000 reports from consumers.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3