Emerging Technologies


Live From ISC West 2017 Now Available

Live From ISC West 2017 Now Available

The live webpage will frequently update with content from the show floor.

FCC Investigating Nationwide 911 Outage for AT&T Users

FCC Investigating Nationwide 911 Outage for AT&T Users

Users of AT&T’s wireless network found themselves without the ability to call 911 last night.

Protect Against the Drone

Protect Against the Drone

Mass-market drones have exploded in popularity over the last few years, with smaller price tags allowing thousands of hobbyists to purchase their own. From casual flyers to news organizations, the rising number of drones (UAVs) flying overhead brings serious security concerns with it.

Security Tight for Super Bowl Sunday

Security Tight for Super Bowl Sunday

Local, federal, state and private security officials are teaming up to create a security stronghold that protects a three mile area around the stadium.

Video Trends To Focus On

Video Trends To Focus On

If these technologies aren’t on your radar, they probably should be. These product categories are rapidly growing in popularity and for good reason.

What

What's In Store

What’s ahead in 2017? In 2016, we saw video surveillance and security increasingly become the focus of mainstream media conversations, with video playing a pivotal role in bringing terror suspects to justice (as it did recently in NYC) and with police body-worn cameras capturing sometimes controversial incidents that spark national conversations.

A Glimpse Into The Future Of IP Video

A Glimpse Into The Future Of IP Video

This year marks the 20th anniversary of the world’s first IP network camera, a technology that eventually revolutionized the video surveillance landscape.

Innovations, Solutions and a Renewed Sense of Pride

It’s an exciting time to be in the security industry, as evidenced by the successful year we have seen in regards to technology innovations, mergers and acquisitions, and a renewed sense of pride in the industry.



Your Best Project: Ten Security Design Tools You Must Try

Your Best Project: Ten Security Design Tools You Must Try

Network design is challenging, requiring designers to balance user performance expectations with network-resource costs, capacities, capabilities, and use scenarios.

Google Seeks to Make Two-Step Authentication Effortless

Google Seeks to Make Two-Step Authentication Effortless

Google announced their new method of two-step authentication, quite possibly the easiest way to log into an account.

Shadow IT: Balancing Efficiency with Security

Shadow IT: Balancing Efficiency with Security

While the practice of Shadow IT has existed since computing became a staple of the workplace and tech-savvy employees started skirting the rules, the risks of Shadow IT have skyrocketed with the exponential rise of mobile devices and cloud technology.

Security Products Dad Will Love

Security Products Dad Will Love

Father’s Day is just around the corner; give Dad the gift of security with one of these products.

Hackers Take Over Outlander PHEV

Hackers Take Over Outlander PHEV

A security firm was able to hack into Mitsubishi Outlander PHEV through its mobile app and disable the theft alarm.

Facebook Vulnerability Allows Hacker to Alter Conversations

Facebook Vulnerability Allows Hacker to Alter Conversations

A security flaw in Facebook’s Messenger platform allowed hackers to edit conversation and implant malicious links.

Solid ROI Metrics Support Case for PIAM

Solid ROI Metrics Support Case for PIAM

By definition, PIAM is an end-to-end solution that manages identities, compliance and events across disparate physical security systems.

Revolving Security

Revolving Security

After revolving doors emerged on the architectural scene in the late 19th century, they were very much in vogue and favored as a way to provide building access stylishly.

Always Something New

As technology in every industry grows by leaps and bounds, there will always be something new to talk about. However, the Internet of Things seems to cross all boundaries, and within an industry IoT becomes the building automation tool to make it all work.

China Unveils First Robot Security Guard

China Unveils First Robot Security Guard

Researchers in China have released details on the first robotic security guard aimed to stop riots.

TV Station Security Pays Off in Bizarre Standoff

TV Station Security Pays Off in Bizarre Standoff

A TV station in Baltimore is grateful for added security measures after bizarre standoff with costumed man.

FBI Paid Over $1 Million to Break into iPhone

FBI Paid Over $1 Million to Break into iPhone

The FBI was finally able to extract the data from the San Bernardino attacker’s iPhone, but was it worth the price?

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.