Top Stories


Here We Go Again

It doesn't seem possible that it's time for the annual ASIS' GSX tradeshow. So, here we come Las Vegas. Seems like I was just there.

Popular Social Media Platform is More Secure than State Department Emails

Popular Social Media Platform is More Secure than State Department Emails

Four U.S. senators are asking for enhanced security for email.

Patrol Wants Increased Security to Remain in North Dakota Capitol

Patrol Wants Increased Security to Remain in North Dakota Capitol

The North Dakota Highway Patrol wants to keep security measures the same following protests of the Dakota Access pipeline.

Security Flaw Discovered in Nearly All Macs and PCs

Security Flaw Discovered in Nearly All Macs and PCs

A new vulnerability brings back the risk of a cold boot attack.

New Hong Kong Airport Luggage Rules Create Security Risk

New Hong Kong Airport Luggage Rules Create Security Risk

Hong Kong Airport cabin crews believe new rules on luggage create unnecessary security risks.

How Security Cameras Helped King City Police Reduce Violence and Improve Safety

How Security Cameras Helped King City Police Reduce Violence and Improve Safety

As King City looks to transform itself from a point of contention in a violent gang war to a safe place to live and work, Hanwha cameras have played a key role in the city’s positive results so far.

DHS Releases Statement on Southwest Border Migration

DHS Releases Statement on Southwest Border Migration

The Department of Homeland Security has released the following statement on Southwest border migration, for August, according to the Customs and Border Protection.

Cyber Security Summit Coming to Global Security Exchange

ASIS International, the world's largest association of security management professionals, recently announced that Cyber Security Summit will co-locate with Global Security Exchange (GSX), expanding the depth of cyber education in the blockbuster GSX conference program



School Violence Through the Decades

School Violence Through the Decades

School shootings are not new. Campuses have been fighting to keep students safe for decades.

Users of Kodi Media Player Targeted by Cryptomining Malware

Users of Kodi Media Player Targeted by Cryptomining Malware

Third-party add-ons were found to contain malware targeting Windows and Linux users

Red Flag Law Seizes Guns from those Deemed Dangerous

Red Flag Law Seizes Guns from those Deemed Dangerous

The red flag law looks to curb gun violence following a string of school shootings.

Bradley D. Spacy and K.T. McFarland Announced for Global Security Exchange Keynote Lineup

ASIS International, the world's largest association for security management professionals, recently reported Air Force Major General Bradley D. Spacy and former Trump Administration Deputy National Security Advisor K.T. McFarland will join the keynote lineup for Global Security Exchange (GSX), the security industry's flagship event.

Six People Dead Following Shooting in California

Six People Dead Following Shooting in Bakersfield, California

A gunman in Bakersfield, Calif. killed his wife and four others before turning the gun on himself Thursday night.

Information Security: Three Industry Apps to Follow

Information Security: Three Industry Apps to Follow

InfoSec has become a hot-button issue.

California Casino Recruits Security Robots

California Casino Recruits Security Robots

The West Coast resort has added two ‘bots to the force, with at least one more planned.

Remembering 9/11

ABC Sydney Tightens Security Following Infiltration

ABC Sydney Tightens Security Following Infiltration

ABC is tightening security at its Sydney headquarters after a man infiltrated security and assaulted an employee.

Airports Increase Security for 9/11 Anniversary

Airports Increase Security for 9/11 Anniversary

Florida officials are boosting security at and around airports for the anniversary of the Sept. 11 attacks.

How to Keep Safe in Cyberspace

How to Keep Safe in Cyberspace

Major threats around the world impend through the internet at alarming rates.

Integrate to Improve Loss Prevention

Integrate to Improve Loss Prevention

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All of these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country.

Future Smartphone Payments to Rely on Software Security

Future Smartphone Payments to Rely on Software Security

Study finds the growth of smartphone payments will increase the use of biometric security measures on mobile devices.

Four Dead, Two Injured in Cincinnati Shooting

Four Dead, Two Injured in Cincinnati Shooting

Three victims are dead and at least two more have been injured in an active shooter situation that took place in downtown Cincinnati this morning.

IT Spending to Increase in 2019 Due to Focus on Security

IT Spending to Increase in 2019 Due to Focus on Security

Businesses will be allocating more funds to their IT sector next year, with most of the budget going to cybersecurity measures.

Seven Indispensable Cybersecurity Tips

Seven Indispensable Cybersecurity Tips

Cybersecurity is something everyone should be concerned about. Every business must work to protect sensitive data and personal privacy. Here are seven indispensable cybersecurity tips for any and everyone on the internet.

Bigger is Getting Better

Bigger is Getting Better

Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport; however, clients who use the facility are required to provide their own inside security.

Consider Data Security

Consider Data Security

Data security is just as important as the premises we safeguard, making it imperative to consider both physical and cybersecurity simultaneously.

Cyber and Security

Challenges come in every form and fashion. The cybersecurity business is no exception. Our cover story comes from Sheila Loy, who is the director healthcare and insurance—Identity & Access Management at HID Global.

Opening New Opportunities

Opening New Opportunities

As demand for controlled access communities continues to grow, so does the demand for secure and flexible access solutions.

Transitioning from Video to Vision

In recent years, video surveillance has experienced a constant and rapid evolution of both technology and use cases for IP video in the traditional life safety and loss prevention worlds.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.