Top News


Future Smartphone Payments to Rely on Software Security

Future Smartphone Payments to Rely on Software Security

Study finds the growth of smartphone payments will increase the use of biometric security measures on mobile devices.

Four Dead, Two Injured in Cincinnati Shooting

Four Dead, Two Injured in Cincinnati Shooting

Three victims are dead and at least two more have been injured in an active shooter situation that took place in downtown Cincinnati this morning.

IT Spending to Increase in 2019 Due to Focus on Security

IT Spending to Increase in 2019 Due to Focus on Security

Businesses will be allocating more funds to their IT sector next year, with most of the budget going to cybersecurity measures.

Seven Indispensable Cybersecurity Tips

Seven Indispensable Cybersecurity Tips

Cybersecurity is something everyone should be concerned about. Every business must work to protect sensitive data and personal privacy. Here are seven indispensable cybersecurity tips for any and everyone on the internet.

Bigger is Getting Better

Bigger is Getting Better

Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security.

Consider Data Security

Consider Data Security

Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.

Cyber and Security

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.

Opening New Opportunities

Opening New Opportunities

As demand for controlled access communities continues to grow, so does the demand for secure and flexible access solutions.



Transitioning from Video to Vision

In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.

Growing Adoption

One of the drivers for cloud adoption is that cloud security has expanded significantly. As confidence in these platforms grows, demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages

Featured

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.