Top Stories


Study: 64% of Businesses Suspect They’ve Been Targeted or Impacted by Nation-State Cyber Attacks

Venafi, provider of machine identity management, today announced the findings of new research that evaluates the security impact of the increasing number of nation-state attacks and recent shifts in geopolitics. Venafi research into the methods used by nation-state threat actors shows the use of machine identities is growing in state-sponsored cyberattacks.

Paxton Founder Tony Ratcliffe Retires – Passes the Reins to His Son

Thirty-eight years after founding Paxton, Tony Ratcliffe, group chairman of technology manufacturer Paxton Access Ltd., is stepping down. His son, Sholto Ratcliffe will take on the role, continuing Paxton’s international journey and his father’s legacy.

Alcatraz AI Names Tad Druart Vice President of Marketing to Accelerate Growth

Alcatraz AI has announced that it has hired Tad Druart as vice president of marketing. In this role, Druart will oversee the company's global marketing programs, including brand strategy, product marketing and communications to accelerate growth.

SIA NCRSF Will Host 9th Charity Golf Outing

SIA NCRSF Will Host 9th Charity Golf Outing

The Security Industry Association (SIA) National Capital Region Security Forum (NCRSF) – a community of leading D.C.-area security professionals representing industry and government – has revealed the details for its ninth annual charity golf tournament.

National Security Expert Brian Harrell Joins Shooter Detection Systems in Advisory Role

SDS works with education, business, government, healthcare, manufacturing and other customers to deliver smart, sensor-driven active shooter detection solutions to reduce response time during active shooter incidents.

SALTO Partners with Southwest Architectural Sales to Increase Presence in Texas and Neighboring States

SALTO Systems has hired Southwest Architectural Sales (SWAS), LLC, to sell and market SALTO’s innovative security products in Texas and neighboring states in the South.

Global VMS Market Projected to be Valued at $30 Billion in a Decade

Global VMS Market Projected to be Valued at $30 Billion in a Decade

The global video management software market is expected to value $4 Billion in 2022 and reach $30 Billion by 2032 while displaying a CAGR of 22.63% during the forecast period.

ESA’s Executive Management Professionals Group Accepting New Members

ESA’s Executive Management Professionals (EMP) Group is accepting applications for new members. It is the leading community for individuals charged with the strategic and financial leadership of electronic security integration and monitoring companies.



Study: U.S. Corporations Facing Increasing Volume of Threats

Study: U.S. Corporations Facing Increasing Volume of Threats

U.S. corporations are facing an increased volume of threats driven by persistent political, social and economic issues, including Roe v. Wade, gun control, diversity, equity and inclusion, the war in Ukraine, return-to-office and COVID-19.

Survey: 58 Percent of Organizations Say Third Parties and Suppliers Were Target of Cloud-Based Breach

Survey: 58 Percent of Organizations Say Third Parties and Suppliers Were Target of Cloud-Based Breach

Proofpoint, Inc., a cybersecurity and compliance company, announced the release of its latest study, Cloud and Web Security Challenges in 2022, in collaboration with The Cloud Security Alliance (CSA).

Security Industry Association Announces RISE Scholarship Opportunity

The Security Industry Association (SIA) is now accepting applications for the SIA RISE Scholarship, an initiative led by the SIA RISE community for young professionals.

Prioritizing Vulnerabilities is a Flawed Process: What’s Needed

The topic of zero-day exploits and exposed vulnerabilities is always trending within cybercriminal communities, both on clear web platforms and on the underground. From 280-character tweets circulated among cybercriminals on Twitter, to POC exploits released on clear web code repositories, to exploit kits and tools shared across the forums and markets of the deep and dark web, threat actor discourse revealing which vulnerabilities they plan to target is far from scarce.

i-PRO Opens of New Global Headquarters in Tokyo

Located in the vibrant business district Shinagawa, i-PRO’s new headquarters will become a new core hub to highlight the company’s latest technological innovation through interactive demonstrations, training sessions, certification classes, and presentations.

NAPCO Promotes Warehime to Vice President of National Accounts

Napco Security Technologies Inc. is announcing that long-time employee Duane Warehime is now the vice president of national accounts for Napco Security Technologies.

Hanwha Techwin Opens New U.S.-based Repair and Parts Center to Better Service Customers

Hanwha Techwin, a global supplier of intelligent video surveillance solutions, opened the doors to its new Hanwha Total Care Center (HTCC) in July.

Florida Airport Uses Artificial Intelligence Software to Enhance Security

Hakimo, a technology company dedicated to modernizing physical security through its artificial intelligence (AI) software, recently announced that Punta Gorda Airport (PGD) has deployed the Hakimo solution to enhance security and support Transportation Security Administration (TSA) compliance efforts

(ISC)² Pledges to Expand and Diversify the Cybersecurity Workforce with Free Certification Education and Exams for 1 Million

(ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – recently announced the (ISC)² One Million Certified in Cybersecurity℠ program, pledging to put one million people through its foundational Certified in Cybersecurity entry-level certification exam and education program for free.

Big Solutions, Small Projects

A lot of buzz in the security industry revolves around the explosion of the global datasphere. Especially as the COVID-19 pandemic has forced many industries to transition from in-house operations to work-from-home—if not entirely digital—formats, global data creation, consumption and circulation has skyrocketed.

Professional Recommendations

Digital transformation is changing the way we do business and COVID-19 accelerated this shift. Organizations that had not already moved data to the cloud, rushed to do it, while others accelerated their shift from on-premise to cloud.

Heightening Field Operations

Heightening Field Operations

Security operations centers are undergoing dramatic changes as operators add hundreds of sources, systems and devices, creating a cacophony of alarms – enough to overwhelm the best-trained staff.

Unique Hiring Demands

Unique Hiring Demands

Mitigating risks and threats along with extensive intelligence analysis are at the core of comprehensive and effective customized executive protection programs.

Keeping Your Eye on the Ball

Potential security threats keep evolving. It’s a distressing reality that we continually need to adapt to—one that particularly weighs heavily on the minds of stakeholders at major sports venues as they explore security solutions to prevent drone, vehicular and other dangerous assaults.

The Case for Access Control

Security experts agree that the three most important components of a physical security plan are access control, surveillance and security testing, which work together to make a space more secure.

Landmark Security

How do you secure the largest cathedral in the world when it sits on 11.3 acres, is considered a New York City landmark, and is a busy destination for worship, cultural arts, social services and tourism?

Discussing Security

The proliferation of smart edge devices that aggregate data and interoperate with other devices and systems on the network, is also fueling this migration by delivering additional sources of data that can help to streamline workflows, build efficiencies and save costs along with numerous other benefits.

Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

Report: Average Cost for Data Breach Reaches All-Time High of $4.35 Million

IBM Security recently released the annual Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations.

A Business Owner’s Demand

A Business Owner’s Demand

Business owners are making the move to higher resolution cameras at a pace that defies the influences of the pandemic, supply chain challenges, and labor shortage, according to a new 2022 worldwide security camera report.

Expanding Safety-Sensitive Roles to Address Cyberattacks

The potential of a cyberattack is one of the most significant threats to businesses across all industries. The increasing sophistication and complexity of these attacks can often go unnoticed, causing widespread damages and disruptions internally and externally to any of its vendors or partners.

The Key to Preventing Production Network Attacks Is to Start Looking Within

The business of cybercrime is rapidly increasing in scope and scale. The cost incurred by companies due to data breaches increased by nearly 10 percent from 2020 to 2021, meaning if the cost incurred by attacks was measured against the GDPs of all the nations of the world, it would be third largest, just lagging behind the U.S. and China.

Protecting the Infrastructure

Protecting the Infrastructure

Critical infrastructure facilities can be quite large, so protecting them is a complex challenge that demands multifaceted solutions. Robust, cybersecure technology solutions exist to protect facilities of all sizes and types but getting the most out of these solutions requires attention to the human element as well.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.