After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool.
Research from the National Skills coalition (NSC) suggests that 92% of today’s jobs require digital skills. It’s frankly hard to believe that figure isn’t at 100 percent. Businesses of all kinds are significantly impacted by applications that manage all sorts of transactions internally and externally. The capture, storage, and use of data is prolific across all industries—and subject to increased risk of unauthorized access and cybersecurity breaches.
During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery.
- By Monique Merhige
- Sep 13, 2024
PureTech Systems, a provider of geospatial AI-boosted video analytics for perimeter and border security, is excited to announce the expansion of their perimeter solutions by further integrating with Axis Communications products. The most recent integration combines PureTech's patented video analytics with the detection capabilities of the Axis Communications D2110-VE security radar.
ISC East, with its premier sponsor Security Industry Association (SIA) and in partnership with the ASIS NYC Chapter, announced this year’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination.
ASSA ABLOY has acquired Level Lock, a technology solutions business based in Redwood City, California.
Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks.
A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries.
- By Charles Pitman
- Sep 11, 2024
Genetec Inc. today announced the launch of Operations Center, a cloud-based work management solution designed specifically for physical security operations. Available as part of Security Center SaaS, or as a standalone product, this new solution is specifically designed for security operations professionals and will revolutionize the way physical security teams collaborate, communicate, and manage their tasks.
In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification.
- By Tony Byerly
- Sep 10, 2024