Top Stories


Milestone Systems Delivers Four Years of Record-High Net Revenue

Milestone Systems, a provider of video technology, delivered record-high net revenue of 1.69 billion DKK (approx. $244.9 million) in 2023, according to the newly released Annual Report.

ASIS International Announces Keynote Lineup for GSX 2024

ASIS International, the world’s largest association for security management professionals, today announced its keynote lineup for the hybrid Global Security Exchange (GSX) 2024, taking place 23-25 September in-person at the Orange County Convention Center (OCCC) in Orlando, FL and online via the GSX 2024 digital platform.

The CMOOR Group Bolsters Business Development with Security Industry Veteran Dan DeBlasio

The CMOOR Group, a leading provider of cloud-based compliance and continuous education solutions for the security, fire, and life safety industry, has announced the appointment of Dan DeBlasio as Director of Business Development.



Mobile IDs, MFA and Sustainability Emerge as Top Trends in New HID Report

HID recently announced its 2024 State of the Security Industry Report, which gathered responses from 2,600 partners, end users, and security and IT personnel worldwide, across a range of job titles and organization sizes representing over 11 industries.

Hanwha Vision Showcases Cloud-connected and AI-powered Surveillance Technologies at ISC West 2024

Hanwha Vision is showcasing its growing ecosystem of cloud-based devices and apps designed to enable on-premise and remote surveillance capabilities, at ISC West 2024, Booth #14025, April 10-12 in Las Vegas. The company will also highlight the proliferation of Artificial Intelligence (AI) throughout its product lines.

Security Today Announces The Govies Government Security Award Winners for 2024

Security Today is pleased to announce the 2024 winners in The Govies Government Security Awards. The awards honor outstanding government security products in a variety of categories.

Stop the Cybersecurity Blame Game

In December, genetic testing company 23andMe acknowledged a hack that led to the theft of nearly seven million customers’ data. As the New York Times reported, criminals obtained “ancestry trees, birth years and geographic locations.” This kind of digital theft may have felt personal to many of those impacted.

Live from ISC West: Pre-Show Preview

It’s hard to believe, but ISC West 2024 is almost here. This year’s show will take place April 9-12 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from ISC West 2024 page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor!

Snap One to Display Solutions from Clare, Control4 and More at ISC West

Snap One, a manufacturer and distributor of smart-living technology for professionals and consumers, will demonstrate a range of products and solutions designed to help Partners build stronger businesses, elevate customer satisfaction, and transform the industry at ISC West 2024 Booth #10053.

Reflections of My 28th ISC West Experience

As the security industry's pinnacle event, ISC West continues to draw seasoned professionals, eager newcomers and curious innovators. Among them stands a figure whose presence has become synonymous with both the event and the industry's evolution—the veteran editor, now embarks on year 28 to the heart of innovation and security.

PSIA Approves PDKC Over ODSP Specification

The Physical Security Interoperability Alliance (PSIA) today announced its Public Key Open Credential (PKOC) specification has expanded to support Open Supervised Device Protocol (OSDP). The new specification, PKOC over OSDP version 1.63, was unanimously ratified by the PSIA Board on March 22. It demonstrates how the ecosystem for PKOC, an open and freely available specification, can be extended to support a range of access control use cases.

ProdataKey Software Platform Introduces Built-In Integrations with Leading Camera Manufacturers

ProdataKey (PDK), manufacturer of cloud access control platform built for mobile, now gives PDK.io system users access to immediate, turnkey integrations with cameras from five manufacturers from within its settings interface: Digital Watchdog, Hanwha Wisenet Wave, NX Witness, Turing, and Spot AI.

Solving Loitering and Open Access Challenges

Loitering is generally not considered a crime with few instances of arrests reported nationally, but it is becoming an increasing problem for a multitude of reasons. One being the use of private spaces such as public-faced restrooms for drug use, other forms of illicit behavior, or as safe havens where homeless individuals are seeking shelter and protection from the elements. In any case, the misuse and prolonged occupancy of publicly accessible spaces prevents them from being accessed for their intended purposes by legitimate users.

A Biometric Revolution

In an era where technological advancements redefine the way we live and work, the transition from classic credentials to biometric authentication stands out as a pivotal shift in the realm of security. Nearly gone are the days of traditional badges and access cards; instead, our own unique biological markers are taking center stage, offering a more secure and seamless authentication experience.

Adapting to See Change

Imagine a retail world rapidly transforming, a landscape where the traditional brick-and-mortar model faces the relentless tide of e-commerce. Well, there is no need to imagine as this is 2024, where market losses surpass $112 billion, and the term “retail apocalypse” is not just hyperbole but a stark reality. 

Shaping the Use of Technology

In the ever-evolving healthcare landscape, hospitals are increasingly turning to video technology for a range of critical applications that extend far beyond traditional security. These innovative systems play a pivotal role in several areas including inventory control, drug diversion prevention, patient monitoring, and compliance with hospital procedures and industry standards.

Vehicle Ramming Attacks

In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.

Enhancing Autonomy Software

In the realm of national and global security, safeguarding critical infrastructure is paramount. It is not just about erecting physical barriers; it is about deploying perimeter security software capable of autonomous detection, alerting, and deterring potential threats. The integration of autonomy software into existing perimeter security systems marks a significant advancement in this field and is now imperative for an effective system.

Early Detection and Deterrence

Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.

How to Roll Out Microsoft Copilot Securely and Ensure Data Security

Microsoft Copilot is a robust AI productivity tool integrated into Microsoft 365 applications. Copilot can significantly improve your daily workflows by assisting you with drafting documents and presentations, capturing action items in Teams meetings, analyzing data in Excel, and other tasks. However, adopting Copilot can also introduce unexpected data security risks because it is built on native access controls within Microsoft 365, meaning it can access all data a user has access to, including documents, emails, and notes. Therefore, it is crucial to prepare your organization for a secure Copilot rollout and ensure that your sensitive data remains under control in the future.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3