Top News


Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Keeper Security has recently released the results of its latest study, The Keeper Password Management Report: Unifying Perception with Reality. Assessing the password habits of over 8,000 individuals across the US, UK, France and Germany , the report reveals that 3 in 4 (75%) people globally don't adhere to widely-accepted password best practices, with a majority (64%) either using weak passwords or repeat variations of passwords to protect their online accounts.

MCi Protects its Customers Worldwide with Enterprise-grade Cyber Security

Serving state, local governments and global Fortune 100 companies in the energy, mining, manufacturing, and chemicals industries, Management Controls Inc. (MCi) needed to transform its cyber security to the world-class level expected by its long list of prestigious customers.

Iris ID Works with Leading Fortune 100 Companies

Iris ID, a provider of iris recognition technology for 25 years, continues to experience outstanding success in establishing partnerships with numerous Fortune 100 companies. Leveraging its cutting-edge iris recognition technology, Iris ID has emerged as a preferred choice for enhancing security measures using the highest form of biometric identity authentication and verification to best safeguard the integrity of critical operations at leading organizations.

Hanwha Vision America Integrates WAVE VMS with AMAG Access Control Systems

Hanwha Vision America has completed the integration of its Wisenet WAVE video management system with AMAG Technology's Symmetry Access Control software, delivering greater system choice and flexibility for customers, especially in AMAG’s key markets including data centers, finance, banking, commercial, healthcare and education.

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Nearly three-quarters of all cyberattacks involve ransomware which means a majority of defenders are failing to detect ransomware successfully. The fact is, ransomware isn’t the first stage of the attack, it’s often the last stage; and cyberattacks usually get labeled or categorized as ransomware when data is encrypted or stolen and a ransom is demanded by cybercriminals.

How AI Platforms Like ChatGPT will Heighten Imposter Attacks—and How to Fight Them

How AI Platforms Like ChatGPT will Heighten Imposter Attacks—and How to Fight Them

Everyone in recent months has been busy either debating the merits of ChatGPT and similar natural language generators—or have been busy using them. The amount of material these AI-driven platforms will produce is mind-boggling, since there seems to be no shortage of businesses and content writers who feel they can benefit from the striking shortcuts these platforms provide. ChatGPT was in fact able to reach 100 million users in its first two months of public existence.

Metrasens and Transparent BPO Partner to Enhance Safety of Client Data

Metrasens and Transparent BPO Partner to Enhance Safety of Client Data

Metrasens, a provider of advanced detection systems for security and safety applications, is proud to announce its partnership with Transparent BPO, a business process outsourcing and contact center organization. This collaboration further enhances Transparent BPO’s already impressive security infrastructure to protect client data.

Survey: More Than 40% of IT Leaders Doubt Their Digital Infrastructure Is Prepared to Accommodate AI Tech

More than four in 10 IT leaders surveyed globally (42%) believe their existing IT infrastructure is not fully prepared for the demands of artificial intelligence (AI) technology, despite its widespread adoption across industries



Why Integrators Should Offer Surge Protection

Why Integrators Should Offer Surge Protection

Picture this – you have just completed a relatively large security system installation for a new enterprise client. The cost of this new system was well into the hundreds of thousands of dollars, representing a significant investment for both you and the deploying organization. But less than a month after install, the customer calls you upset and in a panic.

Why Hackers Have Their Sights Set on Healthcare

Why Hackers Have Their Sights Set on Healthcare

We see it time and time again, the headlines splashed along newspapers and email newsletters that a hospital or its network of offices have been hit in a cybersecurity attack. Now more than ever, we continue to expect that attackers will target nursing homes, doctors’ offices, and other medical facilities due to the immense pressure the industry is facing to modernize. While the advancements in technology are vital to ensuring better patient care, they also open doors for threat actors everywhere.

Featured

  • New Gas Monkey Garage Venue Uses AI-Enhanced Video Technology

    Gas Monkey Garage, the automotive custom shop and entertainment brand founded by Richard Rawlings of Fast N’ Loud TV fame, has opened a vibrant new restaurant and bar in South Dakota, equipped with advanced, AI-enhanced video tech from IDIS Americas. Read Now

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.