In an era where technological advancements redefine the way we live and work, the transition from classic credentials to biometric authentication stands out as a pivotal shift in the realm of security. Nearly gone are the days of traditional badges and access cards; instead, our own unique biological markers are taking center stage, offering a more secure and seamless authentication experience.
- By William Davis
- Mar 26, 2024
The Physical Security Interoperability Alliance (PSIA) today announced its Public Key Open Credential (PKOC) specification has expanded to support Open Supervised Device Protocol (OSDP). The new specification, PKOC over OSDP version 1.63, was unanimously ratified by the PSIA Board on March 22. It demonstrates how the ecosystem for PKOC, an open and freely available specification, can be extended to support a range of access control use cases.
Loitering is generally not considered a crime with few instances of arrests reported nationally, but it is becoming an increasing problem for a multitude of reasons. One being the use of private spaces such as public-faced restrooms for drug use, other forms of illicit behavior, or as safe havens where homeless individuals are seeking shelter and protection from the elements. In any case, the misuse and prolonged occupancy of publicly accessible spaces prevents them from being accessed for their intended purposes by legitimate users.
- By Ronnie Pennington
- Mar 26, 2024
ProdataKey (PDK), manufacturer of cloud access control platform built for mobile, now gives PDK.io system users access to immediate, turnkey integrations with cameras from five manufacturers from within its settings interface: Digital Watchdog, Hanwha Wisenet Wave, NX Witness, Turing, and Spot AI.
In the ever-evolving healthcare landscape, hospitals are increasingly turning to video technology for a range of critical applications that extend far beyond traditional security. These innovative systems play a pivotal role in several areas including inventory control, drug diversion prevention, patient monitoring, and compliance with hospital procedures and industry standards.
- By Mark Johnson
- Mar 25, 2024
Imagine a retail world rapidly transforming, a landscape where the traditional brick-and-mortar model faces the relentless tide of e-commerce. Well, there is no need to imagine as this is 2024, where market losses surpass $112 billion, and the term “retail apocalypse” is not just hyperbole but a stark reality.
- By James Lubary
- Mar 25, 2024
In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.
- By Mark Borto
- Mar 22, 2024
In the realm of national and global security, safeguarding critical infrastructure is paramount. It is not just about erecting physical barriers; it is about deploying perimeter security software capable of autonomous detection, alerting, and deterring potential threats. The integration of autonomy software into existing perimeter security systems marks a significant advancement in this field and is now imperative for an effective system.
- By Megan Willinger
- Mar 21, 2024
Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.
- By Jon Carstensen
- Mar 21, 2024
Microsoft Copilot is a robust AI productivity tool integrated into Microsoft 365 applications. Copilot can significantly improve your daily workflows by assisting you with drafting documents and presentations, capturing action items in Teams meetings, analyzing data in Excel, and other tasks.
However, adopting Copilot can also introduce unexpected data security risks because it is built on native access controls within Microsoft 365, meaning it can access all data a user has access to, including documents, emails, and notes. Therefore, it is crucial to prepare your organization for a secure Copilot rollout and ensure that your sensitive data remains under control in the future.
- By Farrah Gamboa
- Mar 21, 2024